Abstract
Data security is usually an exercise in crafting information flows. RFID tags’ behavior, though, depends heavily on their physical environment. Because they are tiny, passive (i.e., battery-less) devices, issues such as power consumption, read range, and physical placement directly impact security and privacy for RFID tags. In this talk, I’ll illustrate the physical basis of RFID security protocol design with a number of examples from recent research, namely: (1) Cloning of RFID-enabled travel documents, and how power calibration in readers can help prevent it; (2) How power-consumption characteristics of “computational” RFID tags inspire new trust models; (3) How physical tagging costs can act as an incentive for good behavior in supply chains; and (4) Why a physical view of RFID suggests that anti-tracking privacy, a mainstay of RFID security research, is probably futile.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Juels, A. (2010). The Physical Basis of RFID Security. In: Ors Yalcin, S.B. (eds) Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010. Lecture Notes in Computer Science, vol 6370. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16822-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-16822-2_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16821-5
Online ISBN: 978-3-642-16822-2
eBook Packages: Computer ScienceComputer Science (R0)