skip to main content
10.1145/2047456.2047462acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Is RFID technology secure and private?

Published:30 September 2011Publication History

ABSTRACT

Radio Frequency Identification (RFID) has been used in a variety of applications, such as inventory management, anti-theft monitoring of consumer merchandise, and the tagging of livestock. With previous applications, it is difficult to link information stored on an RFID transponder to a specific individual. New applications for RFID technology include embedding transponders in everyday things used by individuals, such as library books, payment cards, and personal identification cards and documents. While RFID technology has existed for decades these new applications carry with them substantial new privacy and security risks for individuals. In this paper I study the risks and security issues of RFID, such as the targeting or tracking of individuals, or the potential disclosure of personal practices or preferences to unauthorized third parties, and how it could be attacked at any part of the RFID system (between RFID tag and reader attacks, middleware attacks and Backend station attacks). Despite the increasing popularity of RFID technology, the electronic information it deals with may not be as secure as was once thought.

References

  1. "Radio Frequency Identification", 2010. SearchNetworking.com RFID, can be retrieved from http://searchnetworking.techtarget.com/sDefinition.290660.sid7_gci80598700.html - BingGoogle ScholarGoogle Scholar
  2. The ABI research technology market intelligence, 2010 can be retrieved from http://www.abiresearch.comGoogle ScholarGoogle Scholar
  3. The IDC Analyze the future, 2010.can be retrieved from http://www.idc.com/Google ScholarGoogle Scholar
  4. Texas Instruments, 2011.can be retrieved from http://en.wikipedia.org/wiki/Texas_InstrumentsGoogle ScholarGoogle Scholar
  5. Problems with RFID, 2011. can be retrieved from http://www.slais.ubc.ca/courses/libr500/04-05-wt2/www/T_Gnissios/problems.htmGoogle ScholarGoogle Scholar
  6. E. Schuman, "2006Major RFID Hurdles Ahead", can be retrieved from http://www.eweek.com/article2/0,1895,1990814,00.aspGoogle ScholarGoogle Scholar
  7. RFID & Individual Privacy, 2010.can be retrieved from http://www.netcaucus.org/events/2005/rfid/one-pagers/cpsr-rfid2005.pdfGoogle ScholarGoogle Scholar
  8. S. Rogerson, 2004. "Police intelligence?" can be retrieved from http://www.ccsr.cse.dmu.ac.uk/resources/general/ethicol/Ecv14no4.pdfGoogle ScholarGoogle Scholar
  9. E. Schuman, 2006." Item-Level RFID Tags Cost More than Expected", can be retrieved from http://www.eweek.com/article2/0,1895,1990814,00.aspGoogle ScholarGoogle Scholar
  10. S. E. Sarma, S. A. Weis and D. W. Engels. 2010. "RFID Systems and Security and Privacy Implications" can be retrieved from http://www.springerlink.com/content/7mdkkqvgwva88qxq/ Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. T. Islam, 2010. "A Brief Survey on RFID Security and Privacy Issues", can be retrieved from http://www.scribd.com/doc/44643060/A-Brief-Survey-on-RFID-Security-and-Privacy-IssuesGoogle ScholarGoogle Scholar
  12. C. Swedberg, 2010. U. S. Tests E-Passports, can be retrieved from http://www.rfidjournal.com/article/view/1218Google ScholarGoogle Scholar
  13. A. Ramos, et al., 2009." Do RFID passports make us vulnerable to identity theft?", can be retrieved from http://cnfolio.com/public/rfid_analysis_of_passports.pdfGoogle ScholarGoogle Scholar
  14. M. Meingast, J. King, D. K. Mulligan, 2007. "Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond", can be retrieved from http://www.academypublisher.com/jcm/vol02/no07/jcm02073648.pdfGoogle ScholarGoogle Scholar
  15. The speedpass. 2011. can be retrieved from https://www.speedpass.com/forms/frinHowItWorks.aspx?pPg/howTech.htm&pgHeader/howGoogle ScholarGoogle Scholar
  16. K. Traub, et al. 2005. "The EPCglobal Architecture Framework", can be retrieved from Available:http://www.gsl.org/gsmp/kc/epcglobal/architecture/architecture_1_0-framework-20050701.pdfGoogle ScholarGoogle Scholar
  17. A. Mitrokotsa, M. R. Rieback and A. S. Tanenbaum, 2010." Classifying RFID attacks and defenses", Classifying RFID attacks and defenses, can be retrieved from http://www.springerlink.com/content/w3j4846448670723/ Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. R. Rieback, B. Crispo, A. S. Tanenbaum, 2006. "Is Your Cat Infected with a Computer Virus?", can be retrieved from http://www.rfidvirus.org/papers/percom.06.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. rfidvirus.org. 2011. "SQL Virus Using Self-Referential Queries", can be retrieved from http://www.rfidvirus.org/exploits/sql_self/index.htmlGoogle ScholarGoogle Scholar
  20. Wikipedia.org, 2010. "Man-in-the-middleattack", can be retrieved from http://en.wikipedia.org/wiki/Man-in-the-middle_attackGoogle ScholarGoogle Scholar
  21. B. Schneier, 2006. "RFID Cards and Man-in-the-Middle Attacks", can be retrieved from http://www.schneier.com/blog/archives/2006/04/rfid_cards_and.htmlGoogle ScholarGoogle Scholar
  22. A. Ali, 2003. "Re-Use of Integrated Dictionary Components for C4ISR Architectures" can be retrieved from http://www.dodccrp.org/events/8th_ICCRTS/Pres/track_4/1_1430ali.pdfGoogle ScholarGoogle Scholar
  23. Speedpass, 2010. can be retrieved from https://www.speedpass.com/forms/frmFaqs.aspx?pPg=faqStartedGoogle ScholarGoogle Scholar
  24. Amit Rawal, 2009. "RFID: The Next Generation Auto-ID Technology" Microwave Journal Vol. 52 No.2 Page 58Google ScholarGoogle Scholar
  25. O. Bang, J. Choi, D. Lee and H. Lee, 2009. "Efficient Novel Anti-collision Protocols for Passive RFID Tags" Auto-ID Labs White PaperGoogle ScholarGoogle Scholar
  26. F. Armenio et al. 2007 "The EPCglobal Architecture Framework" Final Version 1.2(pp.27)Google ScholarGoogle Scholar

Index Terms

  1. Is RFID technology secure and private?

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                InfoSecCD '11: Proceedings of the 2011 Information Security Curriculum Development Conference
                September 2011
                111 pages
                ISBN:9781450308120
                DOI:10.1145/2047456

                Copyright © 2011 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 30 September 2011

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate18of23submissions,78%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader