A Framework for Assessing RFID System Security and Privacy Risks

This framework for evaluating security and privacy risks in RFID systems focuses on key application domains, assessing risk levels for each on the basis of RFID-specific criteria.

[1]  Avishai Wool,et al.  How to Build a Low-Cost, Extended-Range RFID Skimmer , 2006, USENIX Security Symposium.

[2]  Raktim Pal,et al.  Auto-ID: managing anything, anywhere, anytime in the supply chain , 2005, CACM.

[3]  Roy Want,et al.  RFID Technology and Applications , 2006, IEEE Pervasive Computing.

[4]  A. Juels,et al.  The security implications of VeriChip cloning. , 2006, Journal of the American Medical Informatics Association : JAMIA.

[5]  Günter Karjoth,et al.  Disabling RFID tags with visible confirmation: clipped tags are silenced , 2005, WPES '05.

[6]  Oliver Günther,et al.  Security Analysis of the Object Name Service , 2005 .

[7]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[8]  Bart Jacobs,et al.  Crossing Borders: Security and Privacy Issues of the European e-Passport , 2006, IWSEC.

[9]  Susan Hansche,et al.  Official (ISC)2 Guide to the CISSP Exam , 2003 .

[10]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[11]  Avishai Wool,et al.  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[12]  Gerhard P. Hancke,et al.  A Practical Relay Attack on ISO 14443 Proximity Cards , 2005 .

[13]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[14]  Andrew S. Tanenbaum,et al.  Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[15]  Pawel Rotter,et al.  RFID implants: Opportunities and and challenges for identifying people , 2008, IEEE Technology and Society Magazine.

[16]  Markus G. Kuhn,et al.  An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[17]  Andrew S. Tanenbaum,et al.  RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.