Radio Frequency Identification Privacy and Security Issues

Author(s):  
Ismail Aburagaga ◽  
Ammar Almasri
Author(s):  
Chris Hart ◽  
Peter J. Hawrylak

In the event of an accident or emergency, a victim’s medical information such as blood type, prescribed drugs, and other pertinent medical history is critical to Emergency Medical Technicians (EMTs) so that the correct treatment can be provided to the victim as quickly as possible. Victims of car accidents, heart attacks, etc., are not always able to answer simple but crucial medical questions. Treatment time is critical in an emergency situation and the EMT must quickly obtain correct medical information to provide treatment until the victim is stabilized or admitted to the hospital. With an unconscious patient, the EMT must perform a number of tests to obtain these details. A Radio Frequency Identification (RFID) tag encoded with this information could provide this information quickly and correctly, while saving the time and expense of the tests to answer these questions. The ability of the RFID tag to communicate through objects can minimize the movement of the victim to obtain the necessary information. This paper presents a standardized format for encoding (storing) this information in the RFID tag for use in the United States. The use of data compression techniques are explored to maximize the amount of information able to be stored in the RFID tag. Privacy and security issues with this application are discussed and a potential solution is presented.


Author(s):  
Kamalendu Pal

Supply chain management (SCM) systems provide the ability of information sharing and interpretation of contextual information to businesses and help their day-to-day operations. This chapter presents an introduction to radio frequency identification (RFID) technology and its applications in SCM. The chapter also describes the technical basics of RFID systems and examines several industry-specific applications of this technology to SCM to provide crucial implementation reviews. Next, the chapter emphasizes many inherent vulnerabilities of this pervasive computing technology in the context of security and privacy. This chapter presents a classification mechanism for risks that RFID networks come across by describing a categorization of RFID attacks, describing their main characteristics, and discussing possible countermeasures. The chapter aims to classify the existing weakness of RFID communication so that an appropriate understanding of RFID attacks can be realised, and subsequently, more effective procedures can be deployed to combat these attacks.


Author(s):  
Gyozo Gódor ◽  
Sándor Imre

Radio frequency identification technology is becoming ubiquitous, and as an unfortunate side effect, more and more authentication solutions come with more security issues. In former contributions, the authors introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks and performs exceptionally well even in very large systems. The authors gave a theoretical analysis of Simple Lightweight Authentication Protocol (SLAP) protocol from security and performance point of view. This chapter gives a detailed examination of small computational capacity systems from the point of view of security. The authors define the model of attacker and the well-known attacks which can be achieved in these kinds of environments. Furthermore, the chapter gives a summary of the significant RFID authentication protocols which are found in literature. The authors present several lightweight authentication protocols and some novel elliptic curve cryptography based methods. Besides, the chapter illustrates the SLAP protocol’s performance characteristics with measurements carried out in a simulation environment and compares with the theoretical results. The authors show the effects of numerous attacks and the system’s different parameters on the authentication time. Finally, the chapter examines the performance and security characteristics of two other protocols chosen from the literature in order to compare to SLAP algorithm and give proper explanation for the differences between them.


Author(s):  
Peter J. Hawrylak ◽  
Ajay Ogirala ◽  
Bryan A. Norman ◽  
Jayant Rajgopal ◽  
Marlin H. Mickle

Radio frequency identification (RFID) and Real Time Location Systems (RTLS) provide a wireless means to identify, locate, monitor, and track assets and people. RFID technology can be used for resource and patient location, to reduce costs, improve inventory accuracy, and improve patient safety. A number of pilot deployments of RFID and RTLS technology have yielded promising results, reduced costs, and improved patient care. However, there are three major issues facing RFID and RTLS systems, privacy, security, and location accuracy. As described in this chapter the privacy and security issues can be easily addressed by employing standard security measures. Location accuracy issues are physics-related and new advances continue to improve this accuracy. However, in hospital applications accuracy to the room level is sufficient.


2021 ◽  
Author(s):  
Xiaohui Yu

As Radio Frequency Identification (RFID) technology achieves commercial success, its privacy and security issues are becoming a barrier to limit its potential for future start of the art applications. In this report, we present an investigation of the past and current research related to RFID security algorithms and protocols for product authentication. We also present a novel RFID security protocol based on eXtended Tiny Encryption Algorithm (XTEA). Analysis of the security and privacy level of our proposed protocol is performed using SystemC based modeling and different attack models are simulated to show that the protocol is robust and safe against application, protoypes of these attack models are implemented on FPGA platform. We also compare our proposed protocol technique with similar protocols presented in the near past that also use symmetric key algorithms to verify and demostrate main advantages of our protocol in terms of security and performance.


Author(s):  
Kijpokin Kasemsap

This chapter explains the components of Radio Frequency Identification (RFID); the aspects of RFID; the barriers to RFID utilization; the privacy and security issues of RFID; the RFID applications in supply chain management; the RFID applications in the health care industry; the RFID applications in modern business; the Near Field Communication (NFC) in mobile devices; the overview of Mobile Ad-Hoc Network (MANET); the security concern of MANET; and the advanced issues of MANET in the digital age. RFID and MANET become the growing components of Information and Communication Technology (ICT) applications and can be effectively utilized in global operations. The chapter argues that RFID and MANET have the potential to increase the efficiency of operations in various industries, improve asset visibility and traceability, decrease reliance on manual processes, reduce operation costs, and provide useful data for business analytics.


2021 ◽  
Author(s):  
Xiaohui Yu

As Radio Frequency Identification (RFID) technology achieves commercial success, its privacy and security issues are becoming a barrier to limit its potential for future start of the art applications. In this report, we present an investigation of the past and current research related to RFID security algorithms and protocols for product authentication. We also present a novel RFID security protocol based on eXtended Tiny Encryption Algorithm (XTEA). Analysis of the security and privacy level of our proposed protocol is performed using SystemC based modeling and different attack models are simulated to show that the protocol is robust and safe against application, protoypes of these attack models are implemented on FPGA platform. We also compare our proposed protocol technique with similar protocols presented in the near past that also use symmetric key algorithms to verify and demostrate main advantages of our protocol in terms of security and performance.


Sign in / Sign up

Export Citation Format

Share Document