RFID Based Security

The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas. This research presents the RFID Threat Countermeasure Framework (RTCF) to better understand the wide range of RFID threats and their corresponding protection countermeasures. We conclude that RFID security and privacy developments are very promising but do require more development iterations to become practically useful for organizations.

[1]  Marc Langheinrich RFID and Privacy , 2007, Security, Privacy, and Trust in Modern Data Management.

[2]  Andrew S. Tanenbaum,et al.  The evolution of RFID security , 2006, IEEE Pervasive Computing.

[3]  Yunhao Liu,et al.  Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[4]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[5]  Tadayoshi Kohno,et al.  EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond , 2009, CCS.

[6]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[7]  Aikaterini Mitrokotsa,et al.  Classification of RFID Attacks , 2008, IWRT.

[8]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[9]  Andrew S. Tanenbaum,et al.  RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.

[10]  A. Juels,et al.  Universal Re-encryption for Mixnets , 2004, CT-RSA.

[11]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[12]  David A. Wagner,et al.  A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..

[13]  Andrew S. Tanenbaum,et al.  Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).