RFID: A 7-Point Plan to Ensure Privacy
نویسندگان
چکیده
This paper gives an overview of consumer fears associated with the introduction of RFID technology. It analyses the motivation and technical viability of these fears and derives suggestions for privacyfriendly technology design. The analysis shows that all consumer fears currently debated are essentially justified, because from a technical perspective they can all be implemented in the shortor mid-term. A 7-point plan of technological measures is presented that should be taken into consideration and developed further by standardization bodies, researchers and governments in order to impede potential abuses of the technology in the long term.
منابع مشابه
Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملProtecting Privacy and Ensuring Security of RFID Systems Using Private Authentication Protocols
PROTECTING PRIVACY AND ENSURING SECURITY OF RFID SYSTEMS USING PRIVATE AUTHENTICATION PROTOCOLS Md. Endadul Hoque Marquette University, 2010 Radio Frequency IDentification (RFID) systems have been studied as an emerging technology for automatic identification of objects and assets in various applications ranging from inventory tracking to point of sale applications and from healthcare applicati...
متن کاملTraceability improvements of a new RFID protocol based on EPC C1 G2
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
متن کامل