Radio Frequency Identification (RFID): Privacy and Security
نویسنده
چکیده
Despite its long history, Radio Frequency Identification (RFID) is considered as one of the most promising wireless technology in future ubiquitous computing environments. However, it’s a very different form of technology than today’s other wireless dominants such as cellular, satellite, and wireless computer networks. In short, RFID is a contactless, automatic, ultra-light, super-cheap, and extremely convenient method primarily for uncomplicated data capture. The physical design of RFID, therefore, is limited to the minimum capability and feasibility necessary to serve the purpose of the technology. Common wireless communication systems enable people to exchange information over the air. In other words, you’re the actual sender or recipient of the information. For instance, a person talks on the cellular phone, watches the satellite TV, connects to the Internet through WiFi. Emergency services agencies (e.g. police, fire, EMS) extend their eyes and ears by public safety wireless networks in order to control the public safety. The communication is deliberately initiated and terminated by human. Unlike these typical wireless systems, in a RFID system, communication is automatically initiated and terminated by a RFID tag or reader, an object, as long as within the range of radio signals. Therefore, the communication may take place without the consent of a person having the RFID-tagged object; even worse, the person may be totally unaware of such machine-tomachine communication. The above characteristics bring about controversial privacy and security concerns. This paper overviews the RFID technology and includes the assessment of the security aspects. Based on those, the paper discusses major security issues and future directions.
منابع مشابه
Enhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملTraceability improvements of a new RFID protocol based on EPC C1 G2
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
متن کاملLow-Cost RFID Systems: Confronting Security and Privacy
In the implementation of Radio Frequency Identification (RFID) systems concerns have been raised regarding information security and violations of end-user privacy. There is a large collection of literature available on efficient and inexpensive cryptographic engines, but they are still extravagant solutions for low cost RFID systems. Security and privacy provided by low cost RFID is both direct...
متن کاملRFID Security and Privacy: Threats and Countermeasures
The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas. This research presents the RFID Threat Countermeasure Framework (RTCF) to better understand the wide ...
متن کاملSecurity and Privacy: Modest Proposals for Low- Cost RFID Systems
Low cost Radio Frequency Identification (RFID) systems are increasingly being deployed in industry and commerce. These contactless devices have raised public concern regarding violation of privacy and information security. There is a growing need in the RFID community to discover and develop techniques and methods to overcome several problems posed by the above-mentioned concerns. This paper pr...
متن کامل