Title

Strategies for the blocking of RFID tags

Document Type

Conference Proceeding

Publisher

University of Plymouth

Faculty

Computing, Health and Science

School

Computer and Information Science, Centre for Security Research

RAS ID

4360

Comments

Originally published as: Bolan, C. (2006). Strategies for the blocking of RFID tags. Paper presented at the Proceedings of the 6th International Network Conference, INC 2006, 367-376. Original article available here

Abstract

With the adoption of mandatory RFID standards by the US Department of Defence and Walmart, RFID technology is poised to become a mainstay in inventory tracking as well as numerous other applications. With this adoption comes a new source of information and new points of attack. A major vulnerability of RFID systems is the blocking of the RFID tag. This paper reviews RFID technology to see why it is so vulnerable to this type of attack as well as the more common methods of tag blocking. Finally the paper looks at the implications of such vulnerabilities on the use of RFID systems.

 
COinS