Skip to main content

RFID Implementation and Security Issues

  • Conference paper
Book cover Information Security and Assurance (ISA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 200))

Included in the following conference series:

Abstract

Radio Frequency Identification (RFID) is a technology that uses electronic tags to store data which in turn can be accessed in real time wirelessly. There is great potential for RFID technology in our society. RFID tags can be used for supply chain management, inventory systems, animal tracking, instant payments or even human implantation. Standards in the RFID industry are examined with an emphasis place on global standardizing bodies. With the growing use of RFID devices in supply chain management and global shipping, several shipping standards including EPC and ASN are examined. Security has become a major concern with several threats to RFID technology recently exposed. Several solutions are presented for firms wishing to implement RFID technology and minimize the risk to sensitive information and company systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Asahi, T., Yamato, J.: MIT Auto-ID Center Advances the Standardization of RFID Tags. Global Standardization Activities 1, 95–97 (2003)

    Google Scholar 

  2. Baard, M.: RFID: Sign of the (End) Times? (2006), http://www.wired.com/science/discoveries/news/2006/06/70308

  3. Bhatt, H., Glover, B.: RFID Essentials. O’Reilly Media, Inc., Sebastopol (2006)

    Google Scholar 

  4. Brown, M., Sabella, R., Zeisel, E.: RFID + Exam Cram. Que Publishing, Indiana (2006)

    Google Scholar 

  5. Campbell, A., Das, A., Haines, B., Kleinschmidt, J., Thornton, F.: RFID Security. Syngress Publishing, Canada (2006)

    Google Scholar 

  6. CDT Working Group on RFID: Privacy Best Practices for Deployment of RFID Technology, http://www.cdt.org/privacy/20060501rfid-best-practices.php

  7. EPCglobal Inc. - The EPCglobal Architecture Framework (2007), http://www.epcglobalinc.org/standards/architecture/architecture_1_2-framework-20070910.pdf

  8. Gralla, P.: How Personal & Internet Security Work. Que Publishing, Indiana (2006)

    Google Scholar 

  9. Grunwald, L.: What is RFDump (2002), http://www.rf-dump.org/about.shtml

  10. Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  11. Kim, J.: RFID Technology and Private Issues. KSEA Letters 36(2), 45–51 (2008)

    Google Scholar 

  12. Knospe, H., Pobl, H.: RFID Security. Information Security Technical Report 9, 39–49 (2004)

    Article  Google Scholar 

  13. Passports (n.d), http://travel.state.gov/passport/passport_1738.html

  14. Phillips, T., Karygiannis, T., Huhn, R.: Security Standards for the RFID Market. IEEE Security and Privacy 3, 85–89 (2005)

    Article  Google Scholar 

  15. So, S.C.K., Lui, J.J.: Securing RFID Applications: Issues, Methods, and Controls. Information Security Journal: A Global Perspective 15(4), 43–50 (2006)

    Google Scholar 

  16. Radio-frequency identification (n.d), http://en.wikipedia.org/wiki/RFID

  17. Radio Frequency Identification (RFID) Systems, http://epic.org/privacy/rfid/

  18. RFID Business Applications, http://www.rfidjournal.com/article/articleview/1334/1/129/

  19. RFID Consumer Applications and Benefits, http://www.rfidjournal.com/article/articleview/1332/1/129/

  20. Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The Evolution of RFID Security. Pervasive Computing 5(1), 62–69 (2006)

    Article  Google Scholar 

  21. Reiback, M., Crispo, B., Tanenbaum, A.: The Evolution of RFID Security. IEEE Pervasive Computing 5, 62–69 (2006)

    Article  Google Scholar 

  22. Reiback, M., Crispo, B., Tanenbaum, A.: RFID Malware: Truth vs. Myth. IEEE Security and Privacy 4, 70–72 (2006)

    Article  Google Scholar 

  23. The Basics of RFID Technology, http://www.rfidjournal.com/article/articleview/1337/1/129/

  24. The History of RFID Technology, http://www.rfidjournal.com/article/articleview/1338/2/129/

  25. RFID: Improved Patient Safety, http://clearcount.com/rfid-improved-patient-safety

  26. Fuqua, M.: Is RFID Getting Primed To Change Digital Marketing?, http://fifthgearanalytics.com/2010/11/is-rfid-getting-primed-to-change-digital-marketing/

  27. Cho, N.: New US High Tech E-passport, http://www.mydigitallife.info/new-us-high-tech-e-passport/

  28. Jukes, I.: Phones, Paper ‘Chips’ May Fight Disease, http://www.committedsardine.com/blogpost.cfm?blogID=914

  29. Phillips, T., Karygiannis, T., Kuhn, R.: Security Standards for the RFID Market. IEEE Security & Privacy 3(6) (November/December 2005)

    Google Scholar 

  30. Grunwald, L.: RFDump can hack RFID tags, http://www.rfidgazette.org/2004/07/lukas_grunwalds.html

  31. So, S.C.K., Liu, J.J.: Securing RFID Applications: Issues, Methods, and Controls. Information Systems Security, 43–50 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, Y.B., Oh, T.H., Chouta, R. (2011). RFID Implementation and Security Issues. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23141-4_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23140-7

  • Online ISBN: 978-3-642-23141-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics