RFID as an Enabler of the Internet of Things: Issues of Security and Privacy

RFID is one of the enabling technologies of the Internet of Things. RFID has the potential to enable machines to identify objects, understand their status, and communicate and take action if necessary, to create "real time awareness." The pervasiveness of RFID technology has given rise to a number of serious issues including security and privacy concerns. This paper will discuss current RFID usage issues and conduct a threat analysis of the RFID system components then identify issues/risks and elucidate how these issues can be resolved or risks can be mitigated.

[1]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[2]  Bernard Eydt,et al.  Guidelines for Securing Radio Frequency Identification (RFID) Systems | NIST , 2007 .

[3]  Michael Goshey,et al.  Radio Frequency Identification (RFID) , 2008, ACM SIGSPATIAL International Workshop on Advances in Geographic Information Systems.

[4]  F. Mattern From Smart Devices to Smart Everyday Objects ∗ ( Extended Abstract ) , 2003 .

[5]  Laurence T. Yang,et al.  The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems , 2008 .

[6]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[7]  Heather A. Smith,et al.  Developments in Practice X: Radio Frequency Identification (RFID) - An Internet for Physical Objects , 2003, Commun. Assoc. Inf. Syst..

[8]  Leilani Battle,et al.  Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.

[9]  C.A. Paz de Araujo,et al.  Hospital automation RFID-based , 2008, 2008 6th IEEE International Conference on Industrial Informatics.

[10]  Frank Siegemund,et al.  A Context-Aware Communication Platform for Smart Objects , 2004, Pervasive.

[11]  Rolf Clauberg,et al.  RFID and Sensor Networks From Sensor / Actuator to Business Application , 2004 .

[12]  Pattabhiraman Krishna,et al.  RFID Infrastructure , 2007, IEEE Communications Magazine.

[13]  Andrew S. Tanenbaum,et al.  The evolution of RFID security , 2006, IEEE Pervasive Computing.

[14]  Fusheng Wang,et al.  Temporal Management of RFID Data , 2005, VLDB.

[15]  Margaret Martonosi,et al.  Proceedings of the 6th ACM conference on Embedded network sensor systems , 2008 .

[16]  J. Limb,et al.  Editorial on the IEEE/OSA Journal of Lightwave Technology and the IEEE Journal on Selected Areas in Communications , 1986 .

[17]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[18]  Hélio B. de A. Júnior,et al.  Hospital Automation RFID-Based: Technology Stored In Smart Cards , 2008 .

[19]  David Wetherall,et al.  RFID sensor networks with the Intel WISP , 2008, SenSys '08.

[20]  Pawel Rotter,et al.  A Framework for Assessing RFID System Security and Privacy Risks , 2008, IEEE Pervasive Computing.

[21]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[22]  Juan E. Tapiador,et al.  RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.

[23]  Paul Müller,et al.  Tackling Security and Privacy Issues in Radio Frequency Identification Devices , 2004, Pervasive.