Browse > Article
http://dx.doi.org/10.3745/JIPS.2011.7.4.561

A Survey of RFID Deployment and Security Issues  

Grover, Amit (Identity Theft and Financial Fraud Research and Operations Center)
Berghel, Hal (Identity Theft and Financial Fraud Research and Operations Center)
Publication Information
Journal of Information Processing Systems / v.7, no.4, 2011 , pp. 561-580 More about this Journal
Abstract
This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Section 5 highlights different RFID standards and protocols and Section 6 enumerates the wide variety of applications where RFID systems are known to have made a positive improvement. Section 7 deals with privacy issues concerning the use of RFIDs and Section 8 describes common RFID system vulnerabilities. Section 9 covers a variety of RFID security issues, followed by a detailed listing of countermeasures and precautions in Section 10.
Keywords
RFID; RFID Standards; RFID Protocols; RFID Security; EPC structure; RFID Applications; RFID Classification;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 http://www.engadget.com/2008/03/19/rfid-credit-cards-easily-hacked-with-8-reader/
2 http://www.youtube.com/watch?v=vmajlKJlT3U
3 http://www.youtube.com/watch?v=NW3RGbQTLhE
4 http://www.computerworld.com/s/article/9069558/How_they_hacked_it_The_MiFare_RFID_crack_explained
5 RFID: Cloning vs. Spoofing, Bert Moore, http://www.aimglobal.org/members/news/templates/template.aspx?articleid=1564&zoneid=24
6 http://www.thingmagic.com/rfid-security-issues
7 http://www.rfidvirus.org/
8 http://www.idstronghold.com/Secure-Sleeves-for-ID-Payment-Cards-IDSH1003-001-/productinfo/IDSH1003-001/
9 http://www.pacsafe.com/www/index.php?_room=3&_action=detail&id=150
10 Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.5.
11 Newitz, Annalee, "The RFID Hacking Underground", Wired Magazine, http://www.wired.com/wired/archive/14.05/rfid_pr.html
12 Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.99.
13 Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.12.
14 Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.89.
15 Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.73.
16 Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.69.
17 Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.91.
18 http://www.rfid.averydennison.com/products.php#2
19 Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.13-20.
20 Glover, Bill and Himanshu Bhatt, RFID Essentials, O'Reilly Media, Sebastopol CA, 2006, pp.72.
21 "A Summary of RFID Standards", http://www.rfidjournal.com/article/view/1335/2
22 Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.81.
23 Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.112.
24 Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.25,132
25 RFID: The Next Generation Auto-ID Technology, http://www.mwjournal.com/Journal/RFID_Next_Generation_Auto_ID_Technology/AR_7232/
26 Glover, Bill and Himanshu Bhatt, RFID Essentials, O'Reilly Media, Sebastopol CA, 2006, pp.72.
27 Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.276.
28 Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.4.
29 Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.37.
30 http://www.vagabondish.com/flipside-rfid-protected-wallet/
31 Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.297.
32 http://www.gizmag.com/go/5865/
33 Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.279
34 Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.343.
35 Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.342.
36 Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.100.
37 Kyuhee An, Kiyeal Lee, and Mokdong Chung, "Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos", International Journal of Information Processing Systems, Vol.2, No.3, December, 2006.   과학기술학회마을   DOI   ScienceOn
38 Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee, "Security Framework for RFID-based Applications in Smart Home Environment", Journal of Information Processing Systems, Vol.7, No.1, March, 2011.   과학기술학회마을   DOI   ScienceOn
39 Dae-Hee Seo and Im-Yeong Lee, "A Study on RFID System with Secure Service Availability for Ubiquitous Computing", International Journal of Information Processing Systems, Vol.1, No.1, 2005.   과학기술학회마을   DOI   ScienceOn
40 Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.297-363.
41 "Are RFID Chips a Personal Security Risk?", http://www.smartertravel.com/travel-advice/are-rfidchips-personal-security-risk.html?id=2672576
42 http://www.spychips.com/index.html
43 Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.63.
44 http://barcodereader.systemid.com/index.php/2010/09/24/wal-mart-uses-rfid-to-track-underwear/
45 http://cq.cx/verichip.pl