Securing RFID Applications: Issues, Methods, and Controls
نویسندگان
چکیده
adio frequency identification (RFID) is an automatic identification (autoID) technology developed by the Auto-ID Center at the Massachusetts Institute of Technology, relying on storing and remotely retrieving data using devices called RFID tags and readers (Auto-ID Center, 2002; Doyle, 2004; EPC, 2004b; Finkenzeller, 2000; Shepard, 2005). With RFID technology, physical assets will have embedded intelligence that allows them to communicate with each other and with the tracking points (Auto-ID Center, 2002; IBM, 2003; VeriSign, 2004). An RFID tag is a small object that can be attached to or incorporated into a physical asset, such as a book, animal, or person. When an RFID tag passes through the electromagnetic zone, it detects the reader’s activation signal. The reader decodes the data encoded in the tag’s integrated circuit (silicon chip) and the data is passed to the host computer for further processing. As shown in Table 1, there are six classes of RFID tags designed for different applications, including active tags, which require a battery to operate, and passive tags, which have no battery (Auto-ID Center, 2002). RFID tag technology generally dictates the operating parameters of an RFID system. As set forth in ABI, Inc. (2002), other than tag power source, operating frequencies is another main factor influencing the type of RFID applications, where the applications can be generally categorized as: (1) low frequency (LF), for access control or point-of-sales (POS) applications, (2) high frequency (HF), for handling baggage or library items in asset management application, (3) ultra high frequency (UHF) for SCM application, and (4) microwave frequency for electronic toll collection application.
منابع مشابه
Radio Frequency Identification - A Review of Low Cost Tag Security Proposals
With the increased awareness of the potential of RFID technology across a range of applications and as a new source of information emerge new points of attack. Due to cost issues most proposals focus on securing the RFID reader rather than the tag. This paper investigates some of the low-cost proposals for securing RFID tags from potential misuse through authentication and encryption.
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملDetecting Cloning Attack in Low-Cost Passive RFID Tags An Analytic Comparison between KILL Passwords and Synchronized Secrets
Radio Frequency Identification (RFID) technology plays an important role in many sectors today without assuredly taking care of privacy and security issues. One of the most prevalent security issue in RFID is the cloning attack on tags. Most countries now use RFID as a means of verification in electronic passports (epassports). A terrorist that is able to successfully clone the RFID tag on a pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information Systems Security
دوره 15 شماره
صفحات -
تاریخ انتشار 2006