Feature. Security and Privacy Trade-offs in RFID Use. Operational Zone RFID Tag. RFID Reader

Size: px
Start display at page:

Download "Feature. Security and Privacy Trade-offs in RFID Use. Operational Zone RFID Tag. RFID Reader"

Transcription

1 Feature Security and Privacy Trade-offs in RFID Use S. Srinivasan is a professor of computer information systems at the University of Louisville in Kentucky, USA. He can be reached at srini@louisville.edu. Radio frequency identification (RFID) tags are gaining widespread use in supply chains and inventory control. Besides these two areas, RFID is also being touted as a useful tool for marketing and tracking. Given the nature of RFID technology, all these areas are vulnerable to exploitation by unsavory elements that could put people s and organizations privacy in jeopardy. This paper will explore the potential of RFID technology, its vulnerabilities, and the trade-offs that one could accept for the sake of security and privacy. Types and Use of RFID RFID tags were first used more than 60 years ago. The earliest successful use of this technology was in tagging airplanes during World War II. Businesses, however, relied on bar-code technology to manage inventory. Bar-code technology served this purpose well, but with the increasing need for online information a more robust technology is required. This is where RFID comes in. For example, the RFID tag can carry information about the expiration of a product. Moreover, the RFID tag can carry more relevant manufacturing information, such as the plant location and the batch of the product. This is beneficial to quickly identify the correct products in the event of a recall. Identifying the right products quickly for removal from shelves is critical for the health and well-being of consumers. Thus, RFID can play an important role with individual products. Besides tagging individual products, RFID tags are also used in bulk containers when products are shipped. For example, Wal-Mart has been on the cutting edge of using RFID tags on pallets. One advantage is that an RFID tag can be read from a distance without having a lineof-sight requirement. RFID tags are also useful in monitoring containers after an inspection at a port of entry. RFID technology has matured gradually over the past five years. Today, the cost of an RFID tag is around US $0.10 when used in large quantities. There are basically two types of RFID tags: passive and active. A passive tag has a built-in antenna that reflects back the data when interrogated by a compatible reader. The utility of a passive RFID tag is high because it does not become obsolete with the data contained in it. The other type of RFID tag is the active tag, which has a battery source attached to it and broadcasts data contained in the tag. Because the active tag has a built-in battery, it has a limited lifetime. The active tag is much more expensive compared to the passive tag. The passive tag holds up to 2 kilobits (Kb) of data. The active tag holds up to 128 Kb of data. These tags have the capability to have unobstructed reading of up to 300 feet, with a battery life of four years. Figure 1 shows an RFID tag configuration. Figure 1 RFID System RFID Reader Operational Zone RFID Tag RFID tags use various frequencies to communicate their data. Figure 2 illustrates the common frequencies in use for RFID and additional related data, such as storage capacity and distance to an RFID reader. 1 Of these frequencies, the 915 megahertz (MHz) frequency band used in the US allows for the use of anticollision algorithms when multiple tags are involved. 2 Low-frequency RFID tags are the most commonly used tags. They use less power and consequently have shorter range, which gives protection due to proximity. The higher frequencies are useful to scan objects at a 1 ISACA JOURNAL VOLUME 6, 2009

2 Frequency Type Microwave Ultra High Frequency Figure 2 Passive RFID Tag Frequencies, Range and Memory Capacity Frequency Range 2.45 GHz (ISM band) Distance to Reader 866 to 960 MHz 6 meters or more Memory Capacity 2 meters Less than 1 Kb 1 Kb High Frequency MHz 1.5 meters 256 bits to 4 kilobytes (KB) Low Frequency 30 Kilohertz (KHz) to 300 KHz 1 meter 64 bits to 1,360 bits distance. They are primarily used in air-to-air or air-to-ground communications. 3 At this time, active tags are primarily used by organizations such as the US Department of Defense and Wal-Mart. Active RFID tags use the MHz frequency. Even though there is no universal standard for RFID tags, EPCglobal has developed an industry-driven standard: the Electronic Product Code (EPC). 4 The EPC tag is at most 96 bits in length. There are many tags that use proprietary technology and, as such, are not cross-functional with multiple readers. EPCglobal s efforts and that of the International Organization for Standardization (ISO) have resulted in a common standard called the EPC Gen-2 standard. This standard has been ratified and is expected to boost the adoption of RFID tags. RFID technology adoption is expected to benefit the sellers in the retail sector by US $68.55 billion by RFID Security As noted earlier, the data stored in an RFID tag are read using wireless devices. 6, 7 This aspect potentially opens up the data to be read by unauthorized devices. However, this is not a major concern for security because the range of the reader is small and the rogue device requires proximity to the tags. RFID-tagged products are stored in closed quarters, such as a warehouse, which would make it difficult for rogue devices to get close to the products. Another way to enhance the security of the data stored in the RFID tag is to encrypt them. The storage capacity in the RFID tag is so small that one could store only a minimal amount of information in it, such as the unique ID number. This ID number could then be mapped to such information as the model and serial numbers, date and location of manufacturer, product weight, color, and storage location in a database. For example, the tag might contain a manufacturer ID such as This number by itself does not reveal any information until it is matched with the proper database. Protecting databases of encrypted data is more critical than the protection of other types of databases. There are numerous techniques available for this type of protection. The RFID tag has some built-in security in that it will communicate only with proper readers that have the necessary authentication for the tag. Moreover, the RFID tag contains only minimal information that must be corroborated with a database to reveal the information within the tag. Thus, the data contained in an RFID tag are useful only for the people who have access to the associated database. This barrier makes it less of an incentive for an unauthorized rogue reader to pick up data from an RFID tag. As mentioned earlier, the data stored in the RFID tag are sent back to the reader in response to the radio frequency (RF) signal. This method requires the reader to be within a short range of the tag. This proximity requirement adds a level of protection from unauthorized readers trying to read the tags on items stored in a warehouse from a van parked in the street. From an efficiency perspective, a single RF signal could elicit responses from multiple tags simultaneously. For example, when the cargo bay of an aircraft full of RFID-tagged luggage is scanned, the data are sent back to the reader. Thus, there is greater efficiency in retrieval of information using RFID tags than would be possible with bar codes. An RFID reader is capable of processing hundreds of responses per second. 8 An active RFID tag is designed to send out data periodically to any readers that are within its range. An active tag has the ability to receive certain forms of information, such as the global positioning system (GPS) coordinates of its current location, and broadcast the same to the readers. One of the security concerns with RFID tags is cloning. An eavesdropper might capture the RFID tag from a pallet with prescription medicines and place that tag in a new pallet of counterfeit medicines. This is a serious threat; in order to counter this threat, one should use different types of RFID tags for pallets as opposed to the products on a pallet. Such a tag could be called a semipassive or minimally active tag. The tag would contain the circuitry needed for some form of authentication and be powered by a short-life battery. ISACA JOURNAL VOLUME 6,

3 Another option to enhance security is to use independent security chips 9 in conjunction with the RFID tags. Use of such chips is similar to using enhanced passwords that are made available from secondary devices for two-factor authentication. The practical aspect of the security chip is that the pallet is affixed with the security chip associated with the RFID tag; if the tag information is cloned in a counterfeit pallet, it could be detected because the tag will lack the appropriate security chip. Another security solution is the use of an appropriate information system model. The pallet is tagged with an individually identifiable number (IIN) that is hidden from outside view. The IIN is then associated with the bill of lading for that pallet. When the pallet gets the RFID tag, the impostor cannot substitute the original pallet tag on the counterfeit pallet, even if it is cloned, because it will lack the IIN. Since the intruder will not have access to the bill of lading, the IIN cannot be replicated on the counterfeit pallet. However, this adds complexity and cost to the operation. It requires having a reliable, independent mechanism for managing IINs. Thus, arriving at solutions to likely problems is not difficult, but operations must incorporate complexity into the use of simple, ubiquitous RFID tags. Privacy Concerns The RFID tag associated with a product has the potential to uniquely identify the user of that product and, thus, violate the privacy of the individual. In the evolving ubiquitous computing environment, RFID, in conjunction with the pervasive Wi-Fi and Bluetooth technologies, forms the core of the intelligence infrastructure. 10 As an emerging technology, policy makers have an opportunity to understand the potential for abuse of this intelligence infrastructure. The Electronic Privacy Information Center (EPIC) 11 is helping to educate consumers in this regard. The major privacy concerns stem from the fact that individual products are tagged with associated data and, therefore, businesses in the product life cycle will be able to track the products even after the products are sold. Moreover, people with ulterior motives are able to use readers, just like hackers, and can see who has what product. When third parties start gathering such data, their only purpose is to sell those data. When such data become easily available, they enable data miners to extract all types of information from multiple databases and learn about the private lives of individuals. This is a clear violation of privacy. Since RFID technology is not widely deployed yet, the unknown factor in this privacy concern is how people will react to their personal data being accessible. For example, the simple presence of an RFID tag in clothing can be used by an employer to capture data of all people arriving at a particular venue, such as a rally, and compare it with data about when employees arrive for work. The employer may use the data to discriminate or retaliate against employees who were at locations of which the employer disapproves. Such concerns are legitimate. With these concerns in mind, legislation is being developed both at the federal and state levels to protect people s privacy. 12 Since RFID is not yet deployed at levels where it has become a major concern for ordinary individuals, it is necessary, at this stage, to educate the public. In the next section, several trade-offs in which RFID technology can be used while providing the necessary security and privacy protection will be addressed. A common privacy concern with RFID tagging is that the tag can be tracked for its location, such as the active tag discussed previously. For example, automobiles use RFID tags to pay highway tolls. The automobile tags are associated with individuals and their movements could be tracked, violating their privacy. This concern is addressed in the trade-offs section later. The RFID tag as a stand-alone entity may not be useful and may Automobiles use not violate privacy laws; RFID tags to however, when combined with other forms of data, such as point-of-sale data, pay highway tolls. including the method of payment or data from a loyalty card, the person who holds a product containing an RFID tag can be identified. One organization that mass produces RFID tags is Texas Instruments (TI). More than 500 million TI tags, called TI- RFids, have already been produced. 13 When such a large number of tags is attached to various products sold, a huge amount of personal information is gathered and stored. The privacy concerns arise when these tags remain with the items purchased. This concern can be addressed by removing the tags or by disabling the tags at the point of sale. The disabling aspect is a more proactive solution for privacy protection. 3 ISACA JOURNAL VOLUME 6, 2009

4 If bar codes on products are any predictors, RFID tags also could become widely prevalent in the future. Tracking such tags on things that people have on their bodies will cause a furor. For example, if a person has a medical device implanted in his/her body and someone with a suitable reader captures information about the device without the permission of the person, the person is likely to feel that his/her privacy has been violated. One way to protect such data is a locking mechanism. 14 The RFID tag with security features can have a special bit turned on to indicate that it should respond with data only to signals that address the security bit. Even though this is a technical solution to the privacy problem, it is not a cost-effective solution because RFID tags are not fully standardized yet and, as such, readers cannot be standardized. To address this privacy concern, the industry and the standards organizations should fast track the standardization process before the large-scale use of this technology appears in the marketplace. Another approach to ensuring privacy of information from RFID tags is to use some form of IIN on the products physical tags. This additional information would be used only when dealing with individual tags and not when an inventory tracking scan is made of all the tags. The manufacturer can add a three-digit code, similar to the card verification value in credit cards. The number would be visible only on the product tag and the reader would need to be able to accept an input of this kind before it can associate the electronic product code with the necessary databases. Thus, an unauthorized reader would not capture the tag data and derive any meaningful information. This approach provides privacy protection for the individual. RFID tags respond with data when interrogated by the relevant readers. On many occasions, the person with the tag may not be aware that such an interrogation is taking place. In this regard, a policy similar to the World Wide Web Consortium s policy on Privacy Preferences Project is appropriate. 15 Trade-offs for Security and Privacy RFID is a useful technology that can facilitate access to information through the Internet an increasing trend. At the same time, the capabilities of RFID provide many intrusive opportunities, if applied without proper guidelines and controls. Secure access to information is made possible by features outside of RFID technology. Therefore, the main objective here is to discover the degree to which the secure access requirement can be implemented effectively. For example, RFID-generated information can be accessed using a multifactor authentication process. This access restriction causes added processing time and cost. When information is accessed over the Internet, such delays are not acceptable. Thus, suitable policies must be put in place to store only the relevant information that the RFID tag can provide. With regard to privacy, RFID technology can provide too much information that will reveal the personal habits of individuals. This can be mitigated by developing and implementing proper policies. For example, for low-priced items, there is no need for continued tracking of the product beyond the point of sale. Therefore, the RFID tag could be disabled at the point of sale. For high-priced items, such as personal digital assistants (PDAs), digital cameras and cell phones that are easily moved around, some form of postsale tracking, using RFID tags, is useful. At the same time, devices such as these with RFID tags do not need continual tracking. Consequently, the technology should be adapted to track such devices only on demand. Another area of concern with abuse of RFID technology has to do with trust. People assigned the responsibility to check for proper identification rely on relevant equipment for authentication. If the validating equipment gets cloned data and, thus, the identification passes authentication, it can be difficult to detect that a fraud has been committed. Since RFID technology can be abused this way, in instances where high security is needed, additional measures have to be implemented. For example, when a container is examined and cleared with an RFID tag at a port of entry, and the tag information is subsequently cloned, then any other container with contraband goods will also be treated as cleared. To protect against abuse of this type of trust, a second level of authentication should be added in the form of an IIN on the container that is coded in the bill of lading. Another option is to add a security chip to the original container. Monitoring these efforts requires additional time and money. However, this trade-off is needed to protect the original content of the container. Laws such as the US Health Insurance Portability and Accountability Act (HIPAA) and US Family Educational Rights and Privacy Act (FERPA) are in place to protect the privacy of information. HIPAA especially deals with numerous ISACA JOURNAL VOLUME 6,

5 points of data entry that are gathered from multiple sources, including those from RFID tags. Since sharing information in a health network is important, trade-offs must be put in place as to what kind of information is collected from RFID tags that could be abused. Thus, protecting people s privacy may sometimes involve sacrificing the security of information. Conclusion RFID is an evolving technology that has great potential. Global standards are slowly emerging that may make it possible to develop cost-effective tags. Also, policies and procedures are being developed by nonprofit groups, such as EPCglobal, that address privacy concerns. Since people need access to information from remote locations, using technology such as RFID can be cost-effective. Policy makers and policy users should be willing to consider trade-offs in managing this new technology. References Sarma, S.E.; S.A. Weis; D.W. Engels; RFID Systems and Security and Privacy Implications, Springer-Verlag LNCS, vol. 2523, B.S. Kaliski, et al, 2003 Albrecht, K.; RFID: Tracking Everything, Everywhere, accessed 11 October 2008 Alfonsi, B.J.; Privacy Debate Centers on Radio Frequency Identification, IEEE Security and Privacy Magazine, vol. 2, no. 2, March-April 2004, p. 12 Takaragi, K., et al; An Ultra Small Individual Recognition Security Chip, IEEE Micro, vol. 21, no. 6, 43-49, 2001 Garfinkel, S.; B. Rosenberg; RFID Applications, Security, and Privacy, Addison-Wesley Publishers, USA, 2005 Kosta, E., et al; An Analysis of Security and Privacy Issues Relating to RFID Enabled epassports, New Approaches for Security, Privacy and Trust, Springer, 2007 Endnotes 1 IEEE Technical Policy Committee, Developing National Policies on the Deployment of Radio Frequency Identification (RFID) Technology, Floerkemeier, C.; M. Lampe; Issues With RFID Usage in Ubiquitous Computing Applications, Springer-Verlag LNCS, vol. 3001, A. Ferscha, et al, Harper, J.; RFID Tags and Privacy: How Bar-codes on Steroids Are Really a 98-Lb. Weakling, Competitive Enterprise Institute, vol. 89, 21 June EPCglobal, accessed 11 October Barua, A.; D. Mani; A. Whinston; Assessing the Financial Impacts of RFID Technologies on the Retail and Healthcare Sectors, Research Report, Center of Research in Electronic Commerce, University of Texas at Austin, USA, Finkenzeller, K.; RFID Handbook, 2 nd Edition, Weis, S.A.; Radio-frequency Identification Security and Privacy, MIT MS Thesis, Juels, A.; RFID Security and Privacy: A Research Survey, RSA Laboratories, Ibid. 10 Spiekermann, S.; H. Ziekow; RFID: A 7-point Plan to Ensure Privacy, accessed 11 October Electronic Privacy Information Center, accessed 11 October Lemieux, S.; A. Tang; Clone Resistant Mutual Authentication for Low-cost RFID Technology, eprint.iacr.org/2007/170, accessed 11 October Texas Instruments, accessed 11 October Op cit, Juels 15 Floerkemeier, C.; R. Schneider; M. Langheinrich; Scanning With a Purpose Supporting the Fair Information Principles in RFID Protocols, Springer-Verlag LNCS, vol. 3598, H. Murkami, et al, 2005 Vaudenay, S.; RFID Privacy Based on Public-Key Cryptography, Vau06.pdf, accessed 11 October ISACA JOURNAL VOLUME 6, 2009

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

A Study on the Security of RFID with Enhancing Privacy Protection

A Study on the Security of RFID with Enhancing Privacy Protection A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management

More information

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

How To Hack An Rdi Credit Card

How To Hack An Rdi Credit Card RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Radio Frequency Identification (RFID) An Overview

Radio Frequency Identification (RFID) An Overview Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify

More information

Cloud RFID UHF Gen 2

Cloud RFID UHF Gen 2 Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system

More information

On the Security of RFID

On the Security of RFID On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

RFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium.

RFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium. RFID Basics RFID Basics Introduction Radio Frequency Identification (RFID) technology has been attracting considerable attention with the expectation of improved supply chain visibility for both suppliers

More information

rf Technology to automate your BUsiness

rf Technology to automate your BUsiness Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,

More information

Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

An Overview of Approaches to Privacy Protection in RFID

An Overview of Approaches to Privacy Protection in RFID An Overview of Approaches to Privacy Protection in RFID Jimmy Kjällman Helsinki University of Technology Jimmy.Kjallman@tkk.fi Abstract Radio Frequency Identification (RFID) is a common term for technologies

More information

RF ID Security and Privacy

RF ID Security and Privacy RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from

More information

WHITE PAPER. ABCs of RFID

WHITE PAPER. ABCs of RFID WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,

More information

Allwin Initiative for Corporate Citizenship Dartmouth Center for the Advancement of Learning Dickey Center Ethics Institute Institute for Security

Allwin Initiative for Corporate Citizenship Dartmouth Center for the Advancement of Learning Dickey Center Ethics Institute Institute for Security Allwin Initiative for Corporate Citizenship Dartmouth Center for the Advancement of Learning Dickey Center Ethics Institute Institute for Security Technology Studies Leslie Center Rockefeller Center Tucker

More information

RF Attendance System Framework for Faculties of Higher Education

RF Attendance System Framework for Faculties of Higher Education RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,

More information

Data Protection Technical Guidance Radio Frequency Identification

Data Protection Technical Guidance Radio Frequency Identification Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology

More information

Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda

Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda Security Issues in RFID systems By Nikhil Nemade Krishna C Konda Agenda Introduction to an RFID System Possible Application Areas Need for Security Vulnerabilities of an RFID system Security Measures currently

More information

The Marriage of Passive and Active Technologies in Healthcare. Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari

The Marriage of Passive and Active Technologies in Healthcare. Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari The Marriage of Passive and Active Technologies in Healthcare Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari Automated Identification Technologies in Healthcare

More information

CHAPTER 1 Introduction 1

CHAPTER 1 Introduction 1 Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation

More information

Radio Frequency Identification (RFID) Vs Barcodes

Radio Frequency Identification (RFID) Vs Barcodes Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want

More information

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings Are You Missing Out On Huge Savings through Better Asset Management? Many schools around the country have implemented wireless networking

More information

Why Has the Development in RFID Technology Made Asset Management More Urgent?

Why Has the Development in RFID Technology Made Asset Management More Urgent? E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,

More information

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you

More information

Asset Tracking & Radio Frequency Identification White Paper

Asset Tracking & Radio Frequency Identification White Paper 2012 Asset Tracking & Radio Frequency Identification White Paper National Office Systems, Inc. 7621 Rickenbacker Drive, Suite 400 Gaithersburg, MD 20879 T 301.840.6264 F 301.840.0243 www.nosinc.com info@nosinc.com

More information

How Does It Work? Internet of Things

How Does It Work? Internet of Things Intermec UAP-2100 What is RFID? 18-759: Wireless Networks Lecture 14: RFID Peter Steenkiste and Hedda R. Schmidtke Departments of Computer Science and Electrical and Computer Engineering Spring Semester

More information

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Published 10/29/2012 I ndustries are facing fierce market competition, making more data about

More information

Privacy and Security in library RFID Issues, Practices and Architecture

Privacy and Security in library RFID Issues, Practices and Architecture Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library

More information

RFID the next step in consumer-product relations or Orwellian nightmare?

RFID the next step in consumer-product relations or Orwellian nightmare? RFID the next step in consumer-product relations or Orwellian nightmare? Nordic Consumer Policy Research Conference 2007 TOWARDS A NEW CONSUMER? TOWARDS A NEW CONSUMER POLICY? Helsinki, October 3-5, 2007

More information

IMPACT OF RFID ON DATA SHARING AND BUSINESS PROCESSES

IMPACT OF RFID ON DATA SHARING AND BUSINESS PROCESSES IMPACT OF RFID ON DATA SHARING AND BUSINESS PROCESSES Jaymeen R. Shah Department of Computer Information System and Quantitative Methods McCoy College of Business Administration Texas State University-San

More information

RFID Design Principles

RFID Design Principles RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

PAP: A Privacy and Authentication Protocol for Passive RFID Tags

PAP: A Privacy and Authentication Protocol for Passive RFID Tags PAP: A Privacy and Authentication Protocol for Passive RFID s Alex X. Liu LeRoy A. Bailey Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824-1266, U.S.A. {alexliu,

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

A. Background. In this Communication we can read:

A. Background. In this Communication we can read: On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background

More information

RFID Applications in the Healthcare and Pharmaceutical Industries

RFID Applications in the Healthcare and Pharmaceutical Industries RFID Applications in the Healthcare and Pharmaceutical Industries White Paper Revolutionizing Asset Management and the Supply Chain Document Revision: 1.0 Release Date: February 7, 2005 Written by: Johnny

More information

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? TABLE OF CONTENTS What is RFID? 1 Will RFID replace Barcodes? 1 How does RFID work? 1 What is an RFID Tag? 3 What are Smart Labels? 4 Why use RFID? 5 Why

More information

RFID Design Principles

RFID Design Principles RFID Design Principles Second Edition Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents CHAPTER 1 Introduction CHAPTER 2 Short-Range Communications Systems 2.1 Radio-Frequency Spectrum

More information

Closing Wireless Loopholes for PCI Compliance and Security

Closing Wireless Loopholes for PCI Compliance and Security Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop

More information

RFID Radio Frequency Identification

RFID Radio Frequency Identification RFID Radio Frequency Identification 11 February 2004 Dr. Bradley J. Bazuin Assistant Professor, ECE Dept. With material from the ECE 481 & 482 project by Shen-Ping Lee, Young-Sun Kim, and Pradeep Kannan

More information

Privacy Implications of RFID Tags by Paul Stamatiou. CS4001, Georgia Institute of Technology November 8 th, 2007

Privacy Implications of RFID Tags by Paul Stamatiou. CS4001, Georgia Institute of Technology November 8 th, 2007 Privacy Implications of RFID Tags by Paul Stamatiou CS4001, Georgia Institute of Technology November 8 th, 2007 Radio Frequency Identification (RFID) is a maturing wireless technology with widespread uses,

More information

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Bluetooth TM Approach

Bluetooth TM Approach Wireless Networks for Hospitals Bluetooth TM Approach This paper discusses the potential of Hospital Wireless networks. Using Bluetooth wireless technology, Hospital networks can provide rapid access to

More information

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008 RFID Tags Prasanna Kulkarni Motorola ILT Workshop Smart Labels USA February 21, 2008 Agenda RFID tags Brief overview Roadmap of key attribute needs Existing tag technologies Emerging tag technologies Critical

More information

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security 1 Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security for Hospitals: Various Solutions to Meet HIPAA Requirements. Jody Barnes East

More information

Security and privacy in RFID

Security and privacy in RFID Security and privacy in RFID Jihoon Cho ISG PhD Student Seminar 8 November 2007 Outline 1 RFID Primer 2 Passive RFID tags 3 Issues on Security and Privacy 4 Basic Tags 5 Symmetric-key Tags 6 Conclusion

More information

An Overview of RFID Security and Privacy threats

An Overview of RFID Security and Privacy threats An Overview of RFID Security and Privacy threats Maxim Kharlamov mkha130@ec.auckland.ac.nz The University of Auckland October 2007 Abstract Radio Frequency Identification (RFID) technology is quickly deploying

More information

RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region

RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the

More information

Ethical Use of RFID in for the Surveillance of People and the Tracking of Things in Healthcare Delivery

Ethical Use of RFID in for the Surveillance of People and the Tracking of Things in Healthcare Delivery Ethical Use of RFID in for the Surveillance of People and the Tracking of Things in Healthcare Delivery By Michael J. Wilson M.Sc. ehealth Candidate McMaster University Canadian Bioethics Society Conference

More information

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200

entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200 entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200 Understanding RFID and Barcode Differences Don t misuse RFID with applications built for Barcodes Radio Frequency

More information

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Network Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 2 Collaboration with Frank Akujobi

More information

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an

More information

a GAO-05-551 GAO INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government Report to Congressional Requesters

a GAO-05-551 GAO INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters May 2005 INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government a GAO-05-551 Accountability

More information

Tackling Security and Privacy Issues in Radio Frequency Identification Devices

Tackling Security and Privacy Issues in Radio Frequency Identification Devices Tackling Security and Privacy Issues in Radio Frequency Identification Devices Dirk Henrici and Paul Müller University of Kaiserslautern, Department of Computer Science, PO Box 3049 67653 Kaiserslautern,

More information

Military Usage of Passive RFID 1

Military Usage of Passive RFID 1 Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third

More information

RFID Technology. by: Mary Ainsworth. Copyright 2007, Faulkner Information Services. All Rights Reserved.

RFID Technology. by: Mary Ainsworth. Copyright 2007, Faulkner Information Services. All Rights Reserved. RFID Technology by: Mary Ainsworth Copyright 2007, Faulkner Information Services. All Rights Reserved. Docid: 00018942 Publication Date: 0711 Publication Type: TUTORIAL Preview Radio Frequency Identification

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

RFID Security and Privacy: A Research Survey. Vincent Naessens Studiedag Rabbit project

RFID Security and Privacy: A Research Survey. Vincent Naessens Studiedag Rabbit project RFID Security and Privacy: A Research Survey Vincent Naessens Studiedag Rabbit project RFID Security and Privacy: A Research Survey 1. Introduction 2. Security and privacy problems 3. Basic RFID tags 4.

More information

Tracking People s Movements by RFID Implants

Tracking People s Movements by RFID Implants Tracking People s Movements by RFID Implants Name: Seyed Saeid Saadatmand Email: Seyedsae@buffalo.edu Phone number: 716 464 0445 Address: 15 Windham Way - Apt # c Amherst NY - 14228 Program: Urban Planning

More information

RFID Technology - Potential Of Big Brother

RFID Technology - Potential Of Big Brother The Computer in the Sciences: RFID Technology California State University, Stanislaus Student s Name Professor Dan Bratten CS4000-5 March 30, 2006 Last Name 2 The Computer in the Sciences: RFID Technology

More information

Back-end Server Reader Tag

Back-end Server Reader Tag A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags Shucheng Yu, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, MA 01609 {yscheng, wjlou}@wpi.edu

More information

RFID Security: Threats, solutions and open challenges

RFID Security: Threats, solutions and open challenges RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience

More information

RFID Privacy & Security

RFID Privacy & Security 1October 2008 RFID Privacy & Security What is RFID? Here's a plain-english explanation of what radio frequency identification is and why it's suddenly become an important technology. Radio frequency identification

More information

RFID in the Hospital Environment

RFID in the Hospital Environment RFID in the Health Care Industry RFID in the Hospital Environment Speaker: Daniel Engels, Ph.D. Director of Research MIT Auto-ID Labs I. Mun, Ph.D. Director, Bio-Medical Research Aventura Hospital & Medical

More information

Asset Management Services. White Paper

Asset Management Services. White Paper Asset Management Services White Paper Asset Management Solutions provide a comprehensive and systematic method for managing equipment and intelligence in complex IT infrastructure environments. Through

More information

Automated Identification Technologies

Automated Identification Technologies Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT

More information

CONSUMER PERSPECTIVES OF IMPLANTED RADIO FREQUENCY IDENTIFICATION (RFID) DEVICES FOR MEDICAL INFORMATION RETRIEVAL

CONSUMER PERSPECTIVES OF IMPLANTED RADIO FREQUENCY IDENTIFICATION (RFID) DEVICES FOR MEDICAL INFORMATION RETRIEVAL CONSUMER PERSPECTIVES OF IMPLANTED RADIO FREQUENCY IDENTIFICATION (RFID) DEVICES FOR MEDICAL INFORMATION RETRIEVAL Andrew S. Jensen Department of Computer Science College of Computing and Informatics University

More information

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits The IT Guide to RFID Solutions for Schools The Technology, Applications, and Benefits Radio frequency identification, or RFID, has become a leading technology in providing automated and reliable location

More information

SATO RFID White Paper

SATO RFID White Paper SATO RFID White Paper Rev_0710 1 Overview This white paper describes the basic components of a Radio Frequency Identification (RFID) system and explores the technology, applications, and competitive advantages

More information

RFID System Description for Logistics & Inventory

RFID System Description for Logistics & Inventory RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.

More information

A Research on Issues Related to RFID Security and Privacy

A Research on Issues Related to RFID Security and Privacy A Research on Issues Related to RFID Security and Privacy Jongki Kim1, Chao Yang2, Jinhwan Jeon3 1 Division of Business Administration, College of Business, Pusan National University 30, GeumJeong-Gu,

More information

The use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes.

The use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes. Introduction Fixed Asset Tracking has traditionally been a labour-intensive and paper based process while Radio Frequency Identification (RFID) has been reserved for the billing of traffic along toll-ways

More information

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference

More information

LibRFID: Automation Software for Library Management System Using RFID Technology

LibRFID: Automation Software for Library Management System Using RFID Technology LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi,

More information

Modern Multipurpose Security Management System

Modern Multipurpose Security Management System Modern Multipurpose Security Management System Swaranambigai 1,Sabari 2 Dhanabal 3 1 Assistant Professor, 2,3 PG Scholar Department of Electronics and Communication Engineering Jay Shriram Group of Institutions

More information

An Introductory and Elementary Study on RFID & Its Applications

An Introductory and Elementary Study on RFID & Its Applications An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract

More information

TRACEABILITY IN RETAIL: Reducing RFID Media Costs for Best Value

TRACEABILITY IN RETAIL: Reducing RFID Media Costs for Best Value TRACEABILITY IN RETAIL: Reducing RFID Media Costs for Best Value EXECUTIVE SUMMARY Retailers are facing enormous pressure to gain the most return from their business process investments. Radio frequency

More information

SOURCE ID RFID Technologies and Data Capture Solutions

SOURCE ID RFID Technologies and Data Capture Solutions SOURCE ID RFID Technologies and Data Capture Solutions RFID - a vital link for streamlining in-store inventory and supply chain management Source ID believes that worldwide demand for RFID based technology

More information

Security in Near Field Communication (NFC)

Security in Near Field Communication (NFC) Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com

More information

How To Combine Active And Passive Rdi For A More Complete Solution

How To Combine Active And Passive Rdi For A More Complete Solution Evigia RFID Technology Overview: Introduction to Active and Passive RFID Technologies Active RFID and Passive RFID technologies, while often considered and evaluated together, are fundamentally distinct

More information

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran

More information

International Journal of Engineering Research & Management Technology

International Journal of Engineering Research & Management Technology International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of

More information

How To Protect A Wireless Lan From A Rogue Access Point

How To Protect A Wireless Lan From A Rogue Access Point : Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In

More information

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability T. Jepsen, N. Buckley, D. Witters, K. Stine INTRODUCTION The IEEE-USA Medical Technology Policy Committee sponsored

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,

More information

NEW TECHNOLOGY. Figure 1. Simplified view of data transfer in low-frequency passive RFID tags (the tag is enlarged for clarity).

NEW TECHNOLOGY. Figure 1. Simplified view of data transfer in low-frequency passive RFID tags (the tag is enlarged for clarity). RFID offers tantalizing benefits for supply chain management, inventory control, and many other applications. Find out whether your company could benefit. Ron Weinstein RFID: A Technical Overview and Its

More information