RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Is Your Cat Infected with a Computer Virus?
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Classifying RFID attacks and defenses
Information Systems Frontiers
Hi-index | 0.00 |
Radio Frequency Identification (RFID) has been used in a variety of applications, such as inventory management, anti-theft monitoring of consumer merchandise, and the tagging of livestock. With previous applications, it is difficult to link information stored on an RFID transponder to a specific individual. New applications for RFID technology include embedding transponders in everyday things used by individuals, such as library books, payment cards, and personal identification cards and documents. While RFID technology has existed for decades these new applications carry with them substantial new privacy and security risks for individuals. In this paper I study the risks and security issues of RFID, such as the targeting or tracking of individuals, or the potential disclosure of personal practices or preferences to unauthorized third parties, and how it could be attacked at any part of the RFID system (between RFID tag and reader attacks, middleware attacks and Backend station attacks). Despite the increasing popularity of RFID technology, the electronic information it deals with may not be as secure as was once thought.