Abstract
The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes. We describe RFID technology, summarize our approach and our research, and most importantly, describe the research opportunities in RFID for experts in cryptography and information security. The common theme in low-cost RFID systems is that computation resources are very limited, and all aspects of the RFID system are connected to each other. Understanding these connections and the resulting design trade-offs is an important prerequisite to effectively answering the challenges of security and privacy in low-cost RFID systems.
Chapter PDF
References
M. Abadi, M. Burrows, C. Kaufman, and B. W. Lampson. Authentication and delegation with smart-cards, In Theoretical Aspects of Computer Software, pages 326–345, 1991.
R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, LNCS, 1997.
B. Bing. Broadband Wireless Access, Boston, Kluwer Academic Publishers, 2000.
D. Boneh, R.A. DeMillo, and R.J. Lipton. On the importance of checking cryptographic protocols for faults. In EUROCRYPT’97, volume 1233, pages 37–51. Lecture Notes in Computer Science, Advances in Cryptology, 1997.
S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi. A cautionary note regarding evaluation of AES candidates on smart-cards. In Second Advanced Encryption Standard (AES) Candidate Conference, Rome, Italy, 1999.
D. Engels. The Reader Collision Problem. Technical Report. MIT-AUTOID-WH-007, 2001. http://www.autoidcenter.org/research/MIT-AUTOID-WH-007.pdf.
K. Finkenzeller. RFID Handbook, John Wiley & Sons. 1999.
H. Gobio., S. Smith, J.D. Tygar, and B. Yee. Smart cards in hostile environments. In 2nd USENIX Workshop on Elec. Commerce, 1996.
J. Hoffstein, J. Pipher, and J.H. Silverman. NTRU: A ring-based public key cryptosystem. Lecture Notes in Computer Science, volume 1423, 1998.
International Telecommunications Union. Radio Regulations, Vol. 1, 1998.
B.S. Kaliski Jr. and M.J.B. Robshaw. Comments on some new attacks on cryptographic devices. RSA Laboratories' Bulletin No. 5, July 14, 1997. Available from http://www.rsasecurity.com/rsalabs/bulletins/.
S. Sarma, K. Ashton, D. Brock. The Networked Physical World, Technical Report MIT-AUTOID-WH-001, 1999. http://www.autoidcenter.org/research/MITAUTOID-WH-001.pdf.
S. Sarma. Towards the 5 cent Tag, Technical Report MIT-AUTOID-WH-006, 2001. http://www.autoidcenter.org/research/MIT-AUTOID-WH-006.pdf.
T. Scharfeld. An Analysis of the Fundamental Constraints on Low Cost Passive Radio-Frequency Indentification System Design. MS Thesis, Department of Mechanical Engineering, Massachusetts Institue of Technology, Cambridge, MA 02139, 2001.
S.H. Weigart. Physical security devices for computer subsystems: A survey of attacks and defences. CHES 2000, Lecture Notes in Computer Science, volume 1965, pages 302–317, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sarma, S.E., Weis, S.A., Engels, D.W. (2003). RFID Systems and Security and Privacy Implications. In: Kaliski, B.S., Koç, ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems - CHES 2002. CHES 2002. Lecture Notes in Computer Science, vol 2523. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36400-5_33
Download citation
DOI: https://doi.org/10.1007/3-540-36400-5_33
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00409-7
Online ISBN: 978-3-540-36400-9
eBook Packages: Springer Book Archive