RFID tags: privacy and security aspects

Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in manufacturing, SCM, and retail inventory control. However, widespread deployment of RFID tags may create new threats to security and privacy of individuals and organisations. This paper gives an overview of all types of RFID privacy and security problems and its countermeasures.

[1]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[2]  Hassan Aljifri,et al.  Security model for Intra-Domain Mobility Management Protocol , 2004, Int. J. Mob. Commun..

[3]  Tibor Gyires,et al.  M-commerce security: the impact of wireless application protocol (WAP) security services on e-business and e-health solutions , 2003, Int. J. Mob. Commun..

[4]  Keng Siau,et al.  Mobile communications and mobile services , 2003, Int. J. Mob. Commun..

[5]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[6]  Steve H. Weingart Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.

[7]  R. E. Bobbett,et al.  Short range passive telemetry by modulated backscatter of incident cw rf carrier beam. [Remote temperature measurements in cattle] , 1976 .

[8]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[9]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[10]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[11]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[12]  Björn Johansson,et al.  An Introduction to RFID - Information Security and Privacy Concerns , 2004 .

[13]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[14]  Christian Floerkemeier,et al.  Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.

[15]  Samtani Anil,et al.  Overcoming barriers to the successful adoption of mobile commerce in Singapore , 2003, Int. J. Mob. Commun..

[16]  Chang Liu,et al.  Wireless trust: conceptual and operational definition , 2004, Int. J. Mob. Commun..

[17]  Sozo Inoue,et al.  RFID Privacy Using User-Controllable Uniqueness , 2003 .

[18]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[19]  Klaus Finkenzeller,et al.  Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.

[20]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.