A Research on Issues Related to RFID Security and Privacy

  • Jongki Kim
  • Chao Yang
  • Jinhwan Jeon
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 252)


Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFID systems which could threat the technology’s future. To successfully adopt RFID technology in various applications, we need to develop the solutions to protect the RFID system’s data information. This study investigates important issues related to privacy and security of RFID based on the recent literature and suggests solutions to cope with the problem.


Privacy Protection Authentication Protocol Radio Frequency Identification Trust Platform Module Automate Identification System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    A. Juels, RFID Security and Privacy: A Research Survey, IEEE Journal on Selected Areas in Communications, Vol. 24, NO.2, 2006, pp.381–394.MathSciNetCrossRefGoogle Scholar
  2. 2.
    NIST. Guidance for Securing Radio Frequency Identification (RFID) Systems (Draft), Special Publication 800–98 (2006).Google Scholar
  3. 3.
    Sixto Ortiz Jr. How Secure Is RFID? IEEE COMPUTER SOCIETY, Computer Archive Vol. 39, 2006, pp.17–19.CrossRefGoogle Scholar
  4. 4.
    P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, RFID Systems: A Survey on Security Threats and Proposed Solutions, The 11th IFIP International Conference on Personal Wireless Communications-PWC’ 06, Vol. 4217, 2006, pp. 159–170.Google Scholar
  5. 5.
    L. Stegeman, Who’s Afraid of the Big Bad Wolf? (Market Wire, 2004)Google Scholar
  6. 6.
    I. Vajda, and L. Buttyan, Lightweight Authentication Protocols for Low-Cost RFID Tags, Proceedings of the 2nd Workshop on Security in Ubiquitous Computing, 2003, pp. 1–10.Google Scholar
  7. 7.
    I. Kim, B. Lee, and H. Kim, Privacy Protection Based on User-defined Preferences in RFID System, International Conference on Advanced Communication Technology-ICACT’06, 2006, pp. 858–862.Google Scholar
  8. 8.
    H. Lee, and J. Kim, Privacy Threats and Issues in Mobile RFID, Proceedings of the First International Conference on Availability, Reliability, and Security (ARES’ 2006). IEEE Computer Society (April, 2006).Google Scholar
  9. 9.
    S. L. Garfinkel, A. Juels, and R. Pappu, RFID Privacy: An Overview of Problems and Proposed Solutions, IEEE Security and Privacy, vol. 3, 2005, pp. 34–43.CrossRefGoogle Scholar
  10. 10.
    A. Juels, R. L. Rivest, and M. Szydlo, The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy, Proceedings of the 8th ACM Conference on Computer and Communications Security, 2003, pp. 103–111.Google Scholar
  11. 11.
    Y. Xiao, X. Shen, B. Sun, and L. Cai, Security and Privacy in RFID and Applications in Telemedicine, IEEE Communications Magazine, Vol. 44, No. 4, 2006, pp.64–72.CrossRefGoogle Scholar
  12. 12.
    A. Juels, and J. Brainared, Soft blocking: Flexible Blocker Tags on the Cheap, Proceedings of Workshop on Privacy in the Electronic Society(WPES04), 2004, pp. 1–7.Google Scholar
  13. 13.
    S. A. Weis, S. E. Sarma, L. Ronald Rivest, and W. Daiel Engels, Security and Privacy Aspects of Low-cost Radio Frequency Identification System, Proceedings of the 1st International Conference on Security in Pervasive Computing, 2003, pp. 201–212.Google Scholar
  14. 14.
    M. Ohkubo, K. Suzuki, and S. Kinoshita, Cryptographic Approach to Privacy-friendly Tags,” RFID Privacy Workshop (2003): http://www.rfidprivacy.us/2003/agenda.php.
  15. 15.
    S. L. Garfinkel, An RFID Bill of Rights, Technology Review, 2002, p. 35.Google Scholar
  16. 16.
    S. Kinoshita, F. Hoshino, T. Komuro, A. Fujimura, and M. Ohkubo, Low-cost RFID Privacy Protection Scheme, Journal of the International Planetarium Society, Vol. 8, 2003, pp.2007–2021.Google Scholar
  17. 17.
    M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm, Proceedings of Cryptographic Hardware and Embedded Systems-CHES’04, Vol. 3156 of LNCS, 2004, pp. 357–370.MATHGoogle Scholar
  18. 18.
    A. Juels, Yoking-proof’s for RFID Tags, Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW04), 2004, pp.138–143.Google Scholar
  19. 19.
    C. Floerkemeier, R. Schneider, and M. Langheinrich, Scanning With Purpose-Supporting the Fair Information Principles in RFID Protocols, Proceedings of the 2nd International Symposium on Ubiquitous Computing Systems, 2004, pp. 1–9.Google Scholar
  20. 20.
    M. Rieback, C. Cripo, and A. Tanenbaum, RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management Proceedings of the 10th Australasian Conference on Information Security and Privacy (ACISP2005), Vol. 3574 of LNCS, 2005, pp. 184–194.MATHGoogle Scholar
  21. 21.
    D. Molnar, A. Soppera, and D. Wagner, Privacy for RFID through Trusted Computing, Proceedings of Workshop on Privacy in the Electronic Society, 2005, pp. 31–34.Google Scholar
  22. 22.
    D. Molnar, and D. Wagner, Privacy and Security in Library RFID: Issues, Practices, and Architectures, Proceedings of the 11thACM Conference on Computer and Communications Security, 2004, pp. 210–219.Google Scholar
  23. 23.
    S. A. Weis, Security Parallels Between People and Pervasive Devices, The 3rd IEEE Conference on Pervasive Computing and Communications Workshops-PERSEC’05, 2005, pp. 105–109.Google Scholar
  24. 24.
    P. Van Eecke, and G. Skouma, RFID and Privacy: A Difficult Marriage? Journal of Computer, Media and Telecommunications Law, Vol. 3, 2005, pp. 84–90.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2007

Authors and Affiliations

  • Jongki Kim
    • 1
  • Chao Yang
    • 2
  • Jinhwan Jeon
    • 3
  1. 1.Division of Business Administration, College of BusinessPusan National UniversityBusanKorea
  2. 2.Department of Business Administration, Graduate SchoolPusan National UniversityBusanKorea
  3. 3.Research and Education Institute of Banking, Security and DerivativesPusan National UniversityBusanKorea

Personalised recommendations