Radio Frequency Identification (RFID): Privacy and Security

نویسنده

  • Hyung-Joon Kim
چکیده

Despite its long history, Radio Frequency Identification (RFID) is considered as one of the most promising wireless technology in future ubiquitous computing environments. However, it’s a very different form of technology than today’s other wireless dominants such as cellular, satellite, and wireless computer networks. In short, RFID is a contactless, automatic, ultra-light, super-cheap, and extremely convenient method primarily for uncomplicated data capture. The physical design of RFID, therefore, is limited to the minimum capability and feasibility necessary to serve the purpose of the technology. Common wireless communication systems enable people to exchange information over the air. In other words, you’re the actual sender or recipient of the information. For instance, a person talks on the cellular phone, watches the satellite TV, connects to the Internet through WiFi. Emergency services agencies (e.g. police, fire, EMS) extend their eyes and ears by public safety wireless networks in order to control the public safety. The communication is deliberately initiated and terminated by human. Unlike these typical wireless systems, in a RFID system, communication is automatically initiated and terminated by a RFID tag or reader, an object, as long as within the range of radio signals. Therefore, the communication may take place without the consent of a person having the RFID-tagged object; even worse, the person may be totally unaware of such machine-tomachine communication. The above characteristics bring about controversial privacy and security concerns. This paper overviews the RFID technology and includes the assessment of the security aspects. Based on those, the paper discusses major security issues and future directions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Traceability improvements of a new RFID protocol based on EPC C1 G2

Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...

متن کامل

Low-Cost RFID Systems: Confronting Security and Privacy

In the implementation of Radio Frequency Identification (RFID) systems concerns have been raised regarding information security and violations of end-user privacy. There is a large collection of literature available on efficient and inexpensive cryptographic engines, but they are still extravagant solutions for low cost RFID systems. Security and privacy provided by low cost RFID is both direct...

متن کامل

RFID Security and Privacy: Threats and Countermeasures

The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas. This research presents the RFID Threat Countermeasure Framework (RTCF) to better understand the wide ...

متن کامل

Security and Privacy: Modest Proposals for Low- Cost RFID Systems

Low cost Radio Frequency Identification (RFID) systems are increasingly being deployed in industry and commerce. These contactless devices have raised public concern regarding violation of privacy and information security. There is a growing need in the RFID community to discover and develop techniques and methods to overcome several problems posed by the above-mentioned concerns. This paper pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007