Strategies for the blocking of RFID tags
Document Type
Conference Proceeding
Publisher
University of Plymouth
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science / Centre for Security Research
RAS ID
4360
Abstract
With the adoption of mandatory RFID standards by the US Department of Defence and Walmart, RFID technology is poised to become a mainstay in inventory tracking as well as numerous other applications. With this adoption comes a new source of information and new points of attack. A major vulnerability of RFID systems is the blocking of the RFID tag. This paper reviews RFID technology to see why it is so vulnerable to this type of attack as well as the more common methods of tag blocking. Finally the paper looks at the implications of such vulnerabilities on the use of RFID systems.
Comments
Bolan, C. (2006). Strategies for the blocking of RFID tags. Paper presented at the Proceedings of the 6th International Network Conference, INC 2006, 367-376. Available here