Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

Article OPEN
Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew; (2007)
  • Subject:
    acm: Hardware_GENERAL | ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS

This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming i... View more
  • References (10)

    1. EPCglobal. 13.56 mhz ism band class 1 radio frequency (rf) identification tag interface specification

    2. Feldhofer, M.: An authentication protocol in a security layer for rfid smart tags. In: MELECON 2004. The 12th IEEE Mediterranean Electrotechnical Conference, vol. 2, pp. 759-762. IEEE Computer Society Press, Los Alamitos (2004)

    3. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for rfid systems using the aes algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357-370. Springer, Heidelberg (2004)

    4. Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley and Sons, Ltd., Chichester (2003)

    5. Garfinkel, S.: An rfid bill of rights. Technology Review, p. 35 (October 2002)

    6. Gaubatz, G., Kaps, J.-P., Ozturk, E., Sunar, B.: State of the art in public-key cryptography for wireless sensor networks. In: PerSec 2005. Proceedings of the Second IEEE International Workshop on Pervasive Computing and Communication Security, IEEE Computer Society Press, Los Alamitos (2005)

    7. Juels, A.: Minimalist cryptography for low-cost rfid tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, Springer, Heidelberg (2005)

    8. Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: Selective blocking of rfid tags for consumer privacy. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, ACM Press, New York (2003)

    9. Vajda, I., Butty´an, L.: Lightweight authentication protocols for low-cost rfid tags. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, Springer, Heidelberg (2003)

    10. Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of lowcost radio frequency identification systems. In: Hutter, D., Mu¨ller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)

  • Metrics
    No metrics available
Share - Bookmark

  • Cite this publication