RFID-Evaluation of Tag Security Schemes
Document Type
Conference Proceeding
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science / Centre for Security Research
RAS ID
3728
Abstract
With the adoption of mandatory RFID standards by the US Department of Defence and Walmart, RFID technology is poised to become a mainstay in inventory tracking as well as numerous other applications. This is coupled with an increased awareness of the potential of RFID technology across a range of applications and as a new source of information emerge new points of attack. Due to cost issues most proposals focus on securing the RFJD reader rather than the tag. This paper investigates some of the proposals for securing RFID tags from potential misuse through authentication and encryption and compares the schemes with the guidelines of Zhang & King. The analysis shows that while the first criterion of secure tag communication is being directly addressed the remaining criteria for secure systems are ignored or dismissed.
Comments
Bolan, C. (2005). RFID-Evaluation of Tag Security Schemes. In proceedings of the Proceedings of 6th Australian Information Warfare & Security Conference. Melbourne, VIC: Deakin University