This article surveys recent technical research on the problems of privacy and security for RFID (Radio Frequency IDentification).
I n recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables identification from a distance, and unlike... more
In this paper, an overview of antenna design for passive radio frequency identification (RFID) tags is presented. We discuss various requirements of such designs, outline a generic design process including range measurement techniques and... more
We propose the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing.
The role of computers in the modern office has divided our activities between virtual interactions in the realm of the computer and physical interactions with real objects within the traditional office infrastructure. This paper extends... more
In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag.... more
W ITH THE growth of demand for low-cost, flexible, and power-efficient broadband wireless electronics, the materials and integration techniques become more and more critical and face more challenges [1], especially with the ever... more
Short shelf-life grocery goods present some of the biggest challenges for supply chain management due to a high number of product variants, strict traceability requirements, short shelf-life of the products, the need for temperature... more
This paper describes a computer supported ubiquitous learning environment for language learning. This paper proposes two systems. The first is contextaware language-learning support system for Japanese polite expressions learning, which... more
Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to be identified automatically. This paper presents issues concerning security and privacy of... more
Thanks to their broad international acceptance and availability in high denominations, there is widespread concern that Euro banknotes may provide an attractive new currency for criminal transactions. With this in mind, the European... more
With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES... more
We present a new method to accurately locate persons indoors by fusing Inertial Navigation (INS) techniques with active RFID technology. A foot-mounted IMU-based position estimation method, is aided by the Received Signal Strengths (RSS)... more
Indoor positioning systems (IPSs) locate objects in 4 closed structures such as office buildings, hospitals, stores, fac-5 tories, and warehouses, where Global Positioning System devices 6 generally do not work. Most available systems... more
Kurokawa's method of calculating the power reflection coefficient from the Smith chart in the situation when one complex impedance is directly connected to another is applied to passive RFID tag design, where power reflection is... more
is furnished to the author for non-commercial research and education use, including for instruction at the author's institution, sharing with colleagues and providing to institution administration.
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the tag attached to it, changes hands during the course of its... more
In this paper we propose a new block cipher, DESL (DES Lightweight), which is based on the classical DES (Data Encryption Standard) design, but unlike DES it uses a single S-box repeated eight times. 1 On this account we adapt well-known... more
Tag collision arbitration for passive RFID tags is a significant issue for fast tag identification. This letter presents a novel tag anti-collision scheme called Adaptive Binary Splitting (ABS). For reducing collisions, ABS assigns... more
distributed sensing applications. 38 PERVASIVE computing www.computer.org/pervasive ENERGY HARVESTING & CONSERVATION R ecent distributed sensing work has explored two main power supply options: batteries 1-3 and ambient power scavenging.... more
At Crypto'05, Juels and Weis introduce HB+, an enhancement of the Hopper and Blum (HB) authentication protocol. This protocol HB+ is proven secure against active attacks, though preserving HB's advantages: mainly, requiring so... more
The availability of inexpensive CMOS tcchnologies that perform well at microwave frequencies has created new opportunities for automated material handling within supply chain management (SCM) that will, in hindsight, he viewed as... more
The feasibility of integrating antennas and required circuits to form wireless interconnects in foundry digital CMOS technologies has been demonstrated. The key challenges including the effects of metal structures associated with... more
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as properly formatted but fake RFID data; however no one expects... more
SAW tags were invented more than 30 years ago, but only today are the conditions united for mass application of this technology. The devices in the 2.4-GHz ISM band can be routinely produced with optical lithography, high-resolution radar... more
This paper considers the situation of a retail store subject to inventory inaccuracies stemming from execution problems. We assume that inventory inaccuracies are introduced by misplacement type errors that occur within the store, i.e.... more
Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless channel. When multiple tags transmit their IDs... more
We present WISP, a wireless, battery-free platform for sensing and computation that is powered and read by a standards compliant Ultra-High Frequency (UHF) RFID reader. To the reader, the WISP appears to be an ordinary RFID tag. The WISP... more
The differential radar cross-section (RCS) of an RFID tag is an important parameter which determines the power of the modulated backscattered tag signal. The vector differential RCS of an RFID tag as seen by the reader is analysed and,... more
| This paper discusses the evolution towards the first integrated radio-frequency identification (RFID)-enabled wireless sensor network infrastructure using ultra-high frequency/ radio frequency (UHF/RF) RFID-enabled sensor nodes and... more
A Radio Frequency Identification Device (RFID) allows effective identification of a large number of tagged objects without physical or visual contact. RFID systems are a promising technology for supply chain management and inventory... more
This research focuses on RFID-based 3-D positioning schemes, aiming to locate an object in a 3-dimensional space, with reference to a predetermined arbitrary coordinates system, by using RFID tags and readers. More specifically, we... more
We describe a navigation and location determination system for the blind using an RFID tag grid. Each RFID tag is programmed upon installation with spatial coordinates and information describing the surroundings. This allows for a... more
Radio frequency identification systems have many applications in manufacturing, supply chain management, inventory control, and telemedicine. In an RFID system, products and objects are given RFID tags to identify themselves. However,... more
We introduce a new cryptographic primitive, called insubvertible encryption, that produces ciphertexts which can be randomized without the need of any key material. Unlike plain universal re-encryption schemes, insubvertible encryption... more
Juels and Weis (building on prior work of Hopper and Blum) propose and analyze two shared-key authentication protocols -HB and HB + -whose extremely low computational cost makes them attractive for low-cost devices such as radio-frequency... more
A provably secure countermeasure against first order sidechannel attacks has been proposed by . We have implemented the lightweight block cipher PRESENT using the proposed countermeasure. For this purpose we had to decompose the S-box... more
HB + is a shared-key authentication protocol, proposed by Juels and Weis at Crypto 2005, using prior work of Hopper and Blum. Its very low computational cost makes it attractive for low-cost devices such as radio-frequency... more
We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe such technologies and their potential application areas, then give an... more
The manual assessment of Activities of Daily Living (ADLs) is a fundamental problem in elderly care. The use of miniature sensors placed in the environment or worn by a person has great potential in effective and unobtrusive long term... more
An RFID tag features a temperature sensor with gain-error compensation, a dual-path clock generator for both accurate link frequency and low power applications, and a zero-mask CMOS OTP memory array for low cost. The tag executes... more
In this paper, we analyze the security vulnerabilities of EMAP, an efficient RFID mutual authentication protocol recently proposed by . We present two effective attacks, a de-synchronization attack and a fulldisclosure attack, against the... more
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of the "smart-label" variety are likely to serve as a... more
A patent content clustering method is used to cluster different patent documents into homogenous groups, and then technology forecasting is applied to evaluate possible market opportunities for future inventors and investors. The results... more
We present the WISP Passive Data Logger (PDL), an RFID sensor data logging platform that relies on a new, wirelessly-charged power model. A PDL has no battery yet (unlike a passive sensor tag) is able to collect data while away from an... more
As the size of an RFID tag becomes smaller and the price of the tag gets lower, RFID technology has been applied to a wide range of areas. Recently, RFID has been adopted in the business area such as supply chain management. Since... more
We propose a novel method to recognize a user's activities of daily living with accelerometers and rfid sensor. Two wireless accelerometers are used for the classification of 5 human body states using decision tree, and detection of RFID... more