Database Reference
In-Depth Information
for competitors to routinely gather information about the activities of a
business.
The use of RFID technology also has security consequences which go
beyond simple privacy concerns. These are as follows:
RFID technology is highly dependent on the use of radio signals
which are easily jammed. This can open the system to a variety
of infrastructure threats.
It has recently been demonstrated [10], that RFID tags can be
cloned to emit the same identification code as another tag. This
opens the system to fraud, when the RFID tag is used for the pur-
pose of sensitive tasks such as payment. This can also be used in
order to make the function of an automobile immobilizer vulnera-
ble to attack.
We note that privacy issues for RFID data can arise both during data
collection and during data management , once the RFID data has been
captured. For the case of data collection, the information is typically
stolen through eavesdropping on either the tag or the reader signal. In
this case, since the privacy concerns arise from the design of the tag
itself, many of the issues need to be addressed by enhancement and
modification of the underlying tag, with either hardware or software
solutions, or a combination of both. On the other hand, in the case
of data management, the privacy issues relate to the access control of
the underlying data. We will discuss some of the different methods for
privacy preservation both during data collection and management in the
following subsections.
5.1 The Kill Command
The Auto-Id Center designed the “kill” command, which are intended
to be executed at the point of sale. The kill command can be triggered
by a signal, which explicitly disables the tag [63, 64]. If desired, a short
8-bit password can be included with the “kill” command. The tag is
subsequently “dead” and no longer emits the EPC, which is needed to
identify it. However, the killing of a tag, can sometimes be an impractical
solution in cases, where the tags have a utility beyond the point of sale.
Some examples are as follows:
The tags are used for identification purposes in order to facilitate
the repairs or returns for the underlying products.
Many smart appliances use the tags for other purposes. An ex-
ample discussed in [24] discusses the smart refrigerator which uses
Search WWH ::




Custom Search