Security and Privacy in RFID

With the rapid development and wide application of Radio Frequency Identification (RFID), the data security and personal privacy of RFID becomes a bottleneck for the development of RFID. The comprehensive method and policy are needed to solve the problem. There are technical solutions including kill tag, Faraday cage, active jam, tag disabling, Hash lock, random Hash lock, Hash link, and re-encryption. Nowadays, it is very important to find a solution that can protect personal privacy and data security, and has low cost. Moreover, full-fledged policies of RFID security and privacy are needed to cooperate.

[1]  W. P. Walsh,et al.  Research and application of radio frequency identification (RFID) technology to enhance aviation security , 2000, Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093).

[2]  Kazuo Takaragi,et al.  An Ultra Small Individual Recognition Security Chip , 2001, IEEE Micro.

[3]  Najla Raza,et al.  Applications of RFID technology , 1999 .

[4]  M. Ilyas,et al.  RFID Handbook: Applications, Technology, Security, and Privacy , 2008 .