RFID-Evaluation of Tag Security Schemes
Faculty of Computing, Health and Science
School of Computer and Information Science /Centre for Security Research
With the adoption of mandatory RFID standards by the US Department of Defence and Walmart, RFID technology is poised to become a mainstay in inventory tracking as well as numerous other applications. This is coupled with an increased awareness of the potential of RFID technology across a range of applications and as a new source of information emerge new points of attack. Due to cost issues most proposals focus on securing the RFJD reader rather than the tag. This paper investigates some of the proposals for securing RFID tags from potential misuse through authentication and encryption and compares the schemes with the guidelines of Zhang & King. The analysis shows that while the first criterion of secure tag communication is being directly addressed the remaining criteria for secure systems are ignored or dismissed.