Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment

Preprint English OPEN
White, Jonathan; Banerjee, Nilanjan;
(2010)
  • Subject: Computer Science - Cryptography and Security

Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats.... View more
  • References (16)
    16 references, page 1 of 2

    1. EPCglobal Class 1 Gen 2 RFID Speci cation. In RFID Product News Whitepaper.

    2. RSA Privacy and Security. In http:==www.rsa.com=rsalabs=node.asp?id=2115, 2005.

    3. A. Juels. Minimalist Cryptography for Low-Cost RFID Tags. In Security in Communication Networks, 2005.

    4. A. Juels. RFID security and privacy: A research survey. In In RSA Laboratories Manuscript, 2005.

    5. A. Juels. Strengthening EPC tags against cloning. In Proceedings of the 4th ACM Workshop on Wireless Security, 2005.

    6. A. Juels and J. Brainard. Soft blocking: Flexible blocker tags on the cheap. In S. De Capitani di Vimercatiand P. Syverson, editor, Wireless Privacy in the Electronic Society, 2004.

    7. A. Juels, R. Rivest, and M. Szydlo. The blocker tag: Selective blocking of RFID tags for consumer privacy. In 8th ACM Conference on Computer and Communications Security, 2003.

    8. A. Juels, P. Syverson, and D. Bailey. High-power proxies for enhancing RFID privacy and utility. In Privacy Enhancing Technologie, 2005.

    9. M. Langheinrich and R. Marti. Practical Minimalist Cryptography for RFID Privacy. In IEEE Systems Journal, 2007.

    10. M. McCormick. Data Theft: A Prototypical Insider Threat. In Advances in Information Security, 2008.

  • Metrics
Share - Bookmark