Security Problems of RFID Chen Jingyuan 5090309267 Abstract:RFID is a very useful technology nowadays.It has many advantages like its rapid,waterproof,real-time,accurate collection,etc.Certainly,with so many advantages,RFID has some problems revealing through its development.The most important problems must be the security problems.As designers haven't taken the security into account,it has restricted the development of RFID.If RFID's safety can't be ensured,it will bring much loss.So solving the security problems can't wait. Key Words:RFID,Security Problems An RFID system consists of a large number of RFID tags,some RFID readers,and a back-end database.These technical parts enable the collection of any amount of data in any quality on the tagged object or person.This collected information can be searchable and accessible for a clearly defined group of persons or the general public. As RFID develops so fast,we are facing many privacy and security problems to RFID systems.Because of its advantages,RFID is wide-used in many different areas,it seems that solving the security problems has been a very urgent and important thing. Phenomenon There is no access control.Who is allowed to collect data on tagged objects is decided by the person or organization that mounts the tag on the object.But in most time RFID Systems the data on the tag is accessible by anyone who is able to operate a RFID reader.In current RFID applications who is allowed to access certain data is decided by the collector of the data.The collector can keep the data secret and protected.They also can publish it to the public and feed it into lookup and location services.The tag also can be a tracker when a person buy and take the tagged object with him or her.It will threaten personal safety.With the objects people buy,the merchants can easily get what consumers like.On the other hand,people's privacy will be easily exposed.What's more,some application like certifications or finance area,someone can do illegal things through destroy tags or falsify information in tags. It can cause great loss to society. Causes Three problems may be the reasons of RFID's security uninsured. One is the energy problem.RFID tags are mostly passive or half-active,so they can't bring much energy with themselves.When someone has a tag reader,the information in tag will be easy to get. One is the ability of compute,this ability is limited as a tag. Another one is the time,the numbers of agreements is limited,and so time for
Security Problems of RFID Chen Jingyuan 5090309267 Abstract: RFID is a very useful technology nowadays. It has many advantages like its rapid, waterproof, real-time, accurate collection, etc. Certainly, with so many advantages, RFID has some problems revealing through its development. The most important problems must be the security problems. As designers haven’t taken the security into account, it has restricted the development of RFID. If RFID’s safety can’t be ensured, it will bring much loss. So solving the security problems can’t wait. Key Words: RFID, Security Problems An RFID system consists of a large number of RFID tags, some RFID readers, and a back-end database. These technical parts enable the collection of any amount of data in any quality on the tagged object or person. This collected information can be searchable and accessible for a clearly defined group of persons or the general public. As RFID develops so fast, we are facing many privacy and security problems to RFID systems. Because of its advantages, RFID is wide-used in many different areas, it seems that solving the security problems has been a very urgent and important thing. Phenomenon There is no access control. Who is allowed to collect data on tagged objects is decided by the person or organization that mounts the tag on the object. But in most time RFID Systems the data on the tag is accessible by anyone who is able to operate a RFID reader. In current RFID applications who is allowed to access certain data is decided by the collector of the data. The collector can keep the data secret and protected. They also can publish it to the public and feed it into lookup and location services. The tag also can be a tracker when a person buy and take the tagged object with him or her. It will threaten personal safety. With the objects people buy, the merchants can easily get what consumers like. On the other hand, people’s privacy will be easily exposed. What’s more, some application like certifications or finance area, someone can do illegal things through destroy tags or falsify information in tags. It can cause great loss to society. Causes Three problems may be the reasons of RFID’s security uninsured. One is the energy problem. RFID tags are mostly passive or half-active, so they can’t bring much energy with themselves. When someone has a tag reader, the information in tag will be easy to get. One is the ability of compute, this ability is limited as a tag. Another one is the time, the numbers of agreements is limited, and so time for
research the agreements is enough.If the ways of agreements work are be known,the information is revealed to everyone. Solutions We have found some methods to avoid the problems. Kill Tag To let tags loss their function can avoid the track.But it also kills the advantages so that after-sales service can't be done and consumers cannot get information about objects. Renaming Approach An encrypted identifier is itself just a meta-identifier.It is static and,therefore,subject to tracking like any other serial number.To prevent RFID-tag tracking,it is necessary that tag identifiers be suppressed,or that they change over time. Active interference Users can use an equipment to interfere other RFID readers nearby.However,this method will affect other RFID equipments nearby. The Proxying Approach Rather than relying on public RFID readers to enforce privacy protection,consumers might instead carry their own privacy-enforcing devices for RFID. In pace with RFID's development,the security problems will be more and more important,and methods to solve these problems will be much better.RFID will be a perfect tool for us. References Andreas Krisch,RFID Security Issues,European Digital Rights K.Osaka,T.Takagi,K.Yamazaki,and O.Takahashi,An Efficient and Secure RFID Security Method with Ownership Transfer Ari Juels,RFID Security and Privacy:A Research Survey,IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS,VOL.24,NO.2,FEBRUARY 2006, 381-394
research the agreements is enough. If the ways of agreements work are be known, the information is revealed to everyone. Solutions We have found some methods to avoid the problems. Kill Tag To let tags loss their function can avoid the track. But it also kills the advantages so that after-sales service can’t be done and consumers cannot get information about objects. Renaming Approach An encrypted identifier is itself just a meta-identifier. It is static and, therefore, subject to tracking like any other serial number. To prevent RFID-tag tracking, it is necessary that tag identifiers be suppressed, or that they change over time. Active interference Users can use an equipment to interfere other RFID readers nearby. However, this method will affect other RFID equipments nearby. The Proxying Approach Rather than relying on public RFID readers to enforce privacy protection, consumers might instead carry their own privacy-enforcing devices for RFID. In pace with RFID’s development, the security problems will be more and more important, and methods to solve these problems will be much better. RFID will be a perfect tool for us. References Andreas Krisch, RFID Security Issues, European Digital Rights K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, An Efficient and Secure RFID Security Method with Ownership Transfer Ari Juels, RFID Security and Privacy: A Research Survey, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006, 381-394