skip to main content
10.1145/1753846.1753917acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

Visible and controllable RFID tags

Published: 10 April 2010 Publication History

Abstract

Radio frequency identification (RFID) tags containing privacy-sensitive information are increasingly embedded into personal documents (e.g., passports and driver's licenses). The problem is that people are often unaware of the security and privacy risks associated with RFID, likely because the technology remains largely invisible and uncontrollable for the individual. To mitigate this problem, we developed a collection of novel yet simple and inexpensive alternative tag designs to make RFID visible and controllable. This video and demonstration illustrates these designs. For awareness, our tags provide visual, audible, or tactile feedback when in the range of an RFID reader. For control, people can allow or disallow access to the information on the tag by how they touch, orient, move, press, or illuminate the tag (for example, Figure 1 shows a tilt-sensitive RFID tag).

Supplementary Material

JPG File (p3057.jpg)
MOV File (p3057.mov)

References

[1]
Buettner, M., Prasad, R., Sample, A., et al. RFID sensor networks with the Intel WISP. Proc. of SenSys '08, ACM (2008), 393--394.
[2]
Curtin, J., Kauffman, R.J., and Riggins, F.J. Making the 'MOST' out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID. Inf. Technol. and Management 8, 2 (2007), 87--110.
[3]
Czeskis, A., Koscher, K., Smith, J.R., and Kohno, T. RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. Proc. of CCS '08, ACM (2008), 479--490.
[4]
Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., and O Hare, T. Vulnerabilities in first-generation RFID-enabled credit cards. LNCS 4886, Springer (2008), 2.
[5]
Juels, A., Molnar, D., and Wagner, D. Security and Privacy Issues in E-passports. Proc. of SecureComm '05. (2005), 74--88.
[6]
King, J. and McDiarmid, A. Where's the beep?: security, privacy, and user misunderstandings of RFID. Proc. of Conf. on Usability, Psychology, and Security, USENIX Assoc. (2008), 1--8.
[7]
Koscher, K., Juels, A., Brajkovic, V., and Kohno, T. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. Proc. of CCS '09, ACM (2009), 33--42.
[8]
Langheinrich, M. A survey of RFID privacy approaches. Personal and Ubiquitous Computing, (2008).
[9]
Nguyen, D.H., Kobsa, A., and Hayes, G.R. An empirical investigation of concerns of everyday tracking and recording technologies. Proc. of Ubicomp '08, ACM (2008), 182--191.
[10]
Philipose, M., Smith, J.R., Jiang, B., Mamishev, A., Roy, S., and Sundara-Rajan, K. Battery-free Wireless Identification and Sensing. IEEE Pervasive Computing 4, 1 (2005), 37--45.
[11]
Poole, E.S., Dantec, C.A.L., Eagan, J.R., and Edwards, W.K. Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing. Proc. of Ubicomp '08, ACM (2008), 192--201.
[12]
Rieback, M., Crispo, B., and Tanenbaum, A. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. Australasian Conference on Information Security and Privacy - ACISP'05, Springer-Verlag (2005), 184--194.
[13]
Schmidt, A. Implicit human computer interaction through context. Personal and Ubiquitous Computing 4, 2 (2000), 191--199.
[14]
Selker, E.J. Manually Operated Switch for Enabling and Disabling an RFID card. US Patent 6863220, (2005).
[15]
Smith, J.R., Fishkin, K.P., Jiang, B., et al. RFID-based techniques for human-activity detection. Commun. ACM 48, 9 (2005), 39--44.
[16]
Spiekermann, S. and Evdokimov, S. Critical RFID Privacy-Enhancing Technologies. Security & Privacy, IEEE 7, 2 (2009), 56--62.
[17]
Want, R. The Magic of RFID. Queue 2, 7 (2004), 40--48.

Cited By

View all
  • (2023)Intelligent Multi-agent Distributed System for Improving and Secure Travel Procedures: Al-Karama-King Hussein Bridge Study CaseNew Technologies, Artificial Intelligence and Smart Data10.1007/978-3-031-47366-1_11(141-152)Online publication date: 21-Nov-2023
  • (2020)Screen Printed Security-Button for Radio Frequency Identification TagsIEEE Access10.1109/ACCESS.2020.29795488(49224-49228)Online publication date: 2020
  • (2017)BitID: Easily Add Battery-Free Wireless Sensors to Everyday Objects2017 IEEE International Conference on Smart Computing (SMARTCOMP)10.1109/SMARTCOMP.2017.7946990(1-8)Online publication date: May-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI EA '10: CHI '10 Extended Abstracts on Human Factors in Computing Systems
April 2010
2219 pages
ISBN:9781605589305
DOI:10.1145/1753846

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. awareness
  2. control
  3. feedback
  4. privacy
  5. rfid
  6. sensors

Qualifiers

  • Extended-abstract

Conference

CHI '10
Sponsor:

Acceptance Rates

CHI EA '10 Paper Acceptance Rate 350 of 1,346 submissions, 26%;
Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Intelligent Multi-agent Distributed System for Improving and Secure Travel Procedures: Al-Karama-King Hussein Bridge Study CaseNew Technologies, Artificial Intelligence and Smart Data10.1007/978-3-031-47366-1_11(141-152)Online publication date: 21-Nov-2023
  • (2020)Screen Printed Security-Button for Radio Frequency Identification TagsIEEE Access10.1109/ACCESS.2020.29795488(49224-49228)Online publication date: 2020
  • (2017)BitID: Easily Add Battery-Free Wireless Sensors to Everyday Objects2017 IEEE International Conference on Smart Computing (SMARTCOMP)10.1109/SMARTCOMP.2017.7946990(1-8)Online publication date: May-2017
  • (2016)Light-responsive RFID Tags for Precise Locating of Objects in Manual Assembly Verification WorkshopsProcedia CIRP10.1016/j.procir.2015.12.09541(951-956)Online publication date: 2016
  • (2012)Potential Application Areas for RFID ImplantsHuman ICT Implants: Technical, Legal and Ethical Considerations10.1007/978-90-6704-870-5_3(29-39)Online publication date: 16-Jun-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media