Strategies for the blocking of RFID tags
University of Plymouth
Computing, Health and Science
Computer and Information Science, Centre for Security Research
With the adoption of mandatory RFID standards by the US Department of Defence and Walmart, RFID technology is poised to become a mainstay in inventory tracking as well as numerous other applications. With this adoption comes a new source of information and new points of attack. A major vulnerability of RFID systems is the blocking of the RFID tag. This paper reviews RFID technology to see why it is so vulnerable to this type of attack as well as the more common methods of tag blocking. Finally the paper looks at the implications of such vulnerabilities on the use of RFID systems.