Standards, Security & Privacy Issues about Radio Frequency Identification (RFID)

There is no doubt that managing the flow of goods depends on monitoring the real flow in the physical world meanwhile in the digital world. Today automatic identification (auto-ID) technologies are used to close the gap between these two different environments by online updating of databases as the materials flow in the chain. From this point of view, it can be said that auto-ID technologies are core components of automated inventory control systems on all echelons of supply chain. As being a novel subcomponent of auto-ID, RFID innovates important features. Due to the fact that RFID is a recently developed technology, there exist some deficiencies, like the lack of standardization and the lack of legislation regulations that cause questions about privacy and security in society. In this study, we reviewed the standardization studies of related organizations like EPC global and ISO and compare these regulations. We also classify the risks that threaten the privacy of individuals and organizations. Finally, regarding the standardization studies and existing risks towards the privacy of individuals and organizations, security proposals and policy suggestions are introduced.

[1]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[2]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[3]  Hartmut Pohl,et al.  RFID security , 2004, Inf. Secur. Tech. Rep..

[4]  Christian Hirt Radio Frequency Identification - RFID , 2004 .

[5]  David Hillier,et al.  Radio frequency identification in the UK: opportunities and challenges , 2004 .

[6]  Paul Müller,et al.  Tackling Security and Privacy Issues in Radio Frequency Identification Devices , 2004, Pervasive.

[7]  John Ayoade,et al.  Security implications in RFID and authentication processing framework , 2006, Comput. Secur..

[8]  Patrick Chi-leung Hui,et al.  Cryptography and authentication on RFID passive tags for apparel products , 2006, Comput. Ind..

[9]  Matt Ward,et al.  RIFD: Frequency, standards, adoption and innovation , 2006 .

[10]  Matthew J. B. Robshaw An overview of RFID tags and new cryptographic developments , 2006, Inf. Secur. Tech. Rep..

[11]  Hsiao-Cheng Yu,et al.  Challenges to Global RFID Adoption , 2006, 2006 Technology Management for the Global Future - PICMET 2006 Conference.

[12]  David Flint RFID tags, security and the individual , 2006, Comput. Law Secur. Rev..

[13]  Hsiao-Cheng Yu,et al.  Challenges to Global RFID Adoption , 2006 .

[14]  Jorge Munilla,et al.  HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.

[15]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[16]  Josep Domingo-Ferrer,et al.  A distributed architecture for scalable private RFID tag identification , 2007, Comput. Networks.

[17]  D. Wyld Radio Frequency Identification , 2008 .