Evaluating and Improving the Security of RFID Tags in Shipping Containers

This study examines the application and potential vulnerabilities of Radio Frequency Identification (RFID) tags in shipping containers. While RFID tags can easily be used for identifying and monitoring individual containers without their physical inspection, the tags can still pose security risks. The study also includes recommendations regarding how to best protect supply chains at the Ports of Los Angeles and Long Beach, where there has been a steady increase in international trade and shipments.

[1]  Constantine A. Balanis,et al.  Antenna Theory: Analysis and Design , 1982 .

[2]  David A. Wagner,et al.  A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..

[3]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[4]  Christian Floerkemeier,et al.  Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.

[5]  István Vajda,et al.  Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .

[6]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[7]  Matthew Green,et al.  Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.

[8]  Masahiko Takenaka,et al.  Secure Active RFID Tag System , 2005 .

[9]  Juan E. Tapiador,et al.  RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.

[10]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[11]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[12]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[13]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[14]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[15]  A. Juels,et al.  Universal Re-encryption for Mixnets , 2004, CT-RSA.

[16]  Ari Juels,et al.  Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.

[17]  Atsushi Kanai,et al.  Privacy Enhanced Active RFID Tag , 2005 .

[18]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.