Strategies for the blocking of RFID tags

Document Type

Conference Proceeding

Publisher

University of Plymouth

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Information Science / Centre for Security Research

RAS ID

4360

Comments

Bolan, C. (2006). Strategies for the blocking of RFID tags. Paper presented at the Proceedings of the 6th International Network Conference, INC 2006, 367-376. Available here

Abstract

With the adoption of mandatory RFID standards by the US Department of Defence and Walmart, RFID technology is poised to become a mainstay in inventory tracking as well as numerous other applications. With this adoption comes a new source of information and new points of attack. A major vulnerability of RFID systems is the blocking of the RFID tag. This paper reviews RFID technology to see why it is so vulnerable to this type of attack as well as the more common methods of tag blocking. Finally the paper looks at the implications of such vulnerabilities on the use of RFID systems.

Share

 
COinS