DOI QR코드

DOI QR Code

A Survey of RFID Deployment and Security Issues

  • Grover, Amit (Identity Theft and Financial Fraud Research and Operations Center) ;
  • Berghel, Hal (Identity Theft and Financial Fraud Research and Operations Center)
  • Received : 2011.11.15
  • Accepted : 2011.11.25
  • Published : 2011.12.31

Abstract

This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Section 5 highlights different RFID standards and protocols and Section 6 enumerates the wide variety of applications where RFID systems are known to have made a positive improvement. Section 7 deals with privacy issues concerning the use of RFIDs and Section 8 describes common RFID system vulnerabilities. Section 9 covers a variety of RFID security issues, followed by a detailed listing of countermeasures and precautions in Section 10.

References

  1. Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.4.
  2. Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.37.
  3. Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.5.
  4. Newitz, Annalee, "The RFID Hacking Underground", Wired Magazine, http://www.wired.com/wired/archive/14.05/rfid_pr.html
  5. Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.99.
  6. Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.12.
  7. Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.89.
  8. Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.73.
  9. Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.69.
  10. Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.91.
  11. http://www.rfid.averydennison.com/products.php#2
  12. Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.13-20.
  13. Glover, Bill and Himanshu Bhatt, RFID Essentials, O'Reilly Media, Sebastopol CA, 2006, pp.72.
  14. "A Summary of RFID Standards", http://www.rfidjournal.com/article/view/1335/2
  15. Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.81.
  16. Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.112.
  17. Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.25,132
  18. RFID: The Next Generation Auto-ID Technology, http://www.mwjournal.com/Journal/RFID_Next_Generation_Auto_ID_Technology/AR_7232/
  19. Glover, Bill and Himanshu Bhatt, RFID Essentials, O'Reilly Media, Sebastopol CA, 2006, pp.72.
  20. Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.100.
  21. Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.297-363.
  22. "Are RFID Chips a Personal Security Risk?", http://www.smartertravel.com/travel-advice/are-rfidchips-personal-security-risk.html?id=2672576
  23. http://www.spychips.com/index.html
  24. Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.63.
  25. http://barcodereader.systemid.com/index.php/2010/09/24/wal-mart-uses-rfid-to-track-underwear/
  26. http://cq.cx/verichip.pl
  27. http://www.engadget.com/2008/03/19/rfid-credit-cards-easily-hacked-with-8-reader/
  28. http://www.youtube.com/watch?v=vmajlKJlT3U
  29. http://www.youtube.com/watch?v=NW3RGbQTLhE
  30. http://www.computerworld.com/s/article/9069558/How_they_hacked_it_The_MiFare_RFID_crack_explained
  31. RFID: Cloning vs. Spoofing, Bert Moore, http://www.aimglobal.org/members/news/templates/template.aspx?articleid=1564&zoneid=24
  32. http://www.thingmagic.com/rfid-security-issues
  33. http://www.rfidvirus.org/
  34. http://www.idstronghold.com/Secure-Sleeves-for-ID-Payment-Cards-IDSH1003-001-/productinfo/IDSH1003-001/
  35. http://www.pacsafe.com/www/index.php?_room=3&_action=detail&id=150
  36. http://www.vagabondish.com/flipside-rfid-protected-wallet/
  37. Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.276.
  38. Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.297.
  39. http://www.gizmag.com/go/5865/
  40. Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.279
  41. Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.343.
  42. Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.342.
  43. Kyuhee An, Kiyeal Lee, and Mokdong Chung, "Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos", International Journal of Information Processing Systems, Vol.2, No.3, December, 2006. https://doi.org/10.3745/JIPS.2006.2.3.170
  44. Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee, "Security Framework for RFID-based Applications in Smart Home Environment", Journal of Information Processing Systems, Vol.7, No.1, March, 2011. https://doi.org/10.3745/JIPS.2011.7.1.111
  45. Dae-Hee Seo and Im-Yeong Lee, "A Study on RFID System with Secure Service Availability for Ubiquitous Computing", International Journal of Information Processing Systems, Vol.1, No.1, 2005. https://doi.org/10.3745/JIPS.2005.1.1.096

Cited by

  1. Enabling Technologies for Green Internet of Things vol.11, pp.2, 2017, https://doi.org/10.1109/JSYST.2015.2415194
  2. Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing vol.10, pp.1, 2014, https://doi.org/10.1155/2014/389476
  3. “Solutions for RFID Smart Tagged Card Security Vulnerabilities” vol.4, 2013, https://doi.org/10.1016/j.aasri.2013.10.042
  4. Reliability and security of arbiter-based physical unclonable function circuits vol.26, pp.6, 2013, https://doi.org/10.1002/dac.2411
  5. Modeling RFID readers deployment in three-dimensional space vol.7, pp.2-3, 2016, https://doi.org/10.3233/RFT-150076
  6. Building a Smooth Medical Service for Operating Room Using RFID Technologies vol.2014, 2014, https://doi.org/10.1155/2014/984721