RFID implants: Opportunities and and challenges for identifying people

Information and communication technologies (ICT), in general, and the Internet, in particular, have to a digitalization information and to "always-on" remotely accessible services. To ensure that these services are accessed with appropriate levels of security and privacy, the need for the identification and authentication (I&A) of individuals has increased. For most applications, the I&A process is the first line of defense, which aims to prevent unauthorized access to computer systems. Identification is the means by which a user provides a claimed identity to the system, while authentication relates to the verification of that person's identity, i.e., it ensures that a person is who he/she claims to be.

[1]  Pawel Rotter,et al.  A Framework for Assessing RFID System Security and Privacy Risks , 2008, IEEE Pervasive Computing.

[2]  Christine Perakslis,et al.  Social acceptance of RFID as a biometric security method , 2005, Proceedings. 2005 International Symposium on Technology and Society, 2005. Weapons and Wires: Prevention and Safety in a Time of Fear. ISTAS 2005..

[3]  Ann Marburger,et al.  Implantable RFID for The Health Industry , 2005 .

[4]  Lorenz M. Hilty,et al.  End-of-life impacts of pervasive computing , 2005, IEEE Technology and Society Magazine.

[5]  Markus G. Kuhn,et al.  An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[6]  Raktim Pal,et al.  Auto-ID: managing anything, anywhere, anytime in the supply chain , 2005, CACM.

[7]  Roy Want,et al.  RFID Technology and Applications , 2006, IEEE Pervasive Computing.

[8]  Joshua R. Smith,et al.  RFID-based techniques for human-activity detection , 2005, Commun. ACM.

[9]  Avishai Wool,et al.  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[10]  Gerhard P. Hancke,et al.  A Practical Relay Attack on ISO 14443 Proximity Cards , 2005 .