Global Sales Contact List

Contact   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

RSA Laboratories

The Physical Basis of RFID Security

Citation: A. Juels: The Physical Basis of RFID Security. RFIDSec. 2010.

Abstract: Data security is usually an exercise in crafting information flows. RFID tags' behavior, though, depends heavily on their physical environment. Because they are tiny, passive (i.e., battery-less) devices, issues such as power consumption, read range, and physical placement directly impact security and privacy for RFID tags. In this talk, I'll illustrate the physical basis of RFID security protocol design with a number of examples from recent research, namely: (1) Cloning of RFID-enabled travel documents, and how power calibration in readers can help prevent it; (2) How power-consumption characteristics of "computational" RFID tags inspire new trust models; (3) How physical tagging costs can act as an incentive for good behavior in supply chains; and (4) Why a physical view of RFID suggests that anti-tracking privacy, a mainstay of RFID security research, is probably futile.

Full Publication List

Notes:
Connect with EMCConnect with EMC
Need help immediately? EMC Sales Specialists are standing by to answer your questions real time.
Use Live Chat for fast, direct access to EMC Customer Service Professionals to resolve your support questions.
Explore and compare EMC products in the EMC Store, and get a price quote from EMC or an EMC partner.
We're here to help. Send us your sales inquiry and an EMC Sales Specialist will get back to you within one business day.
Want to talk? Call us to speak with an EMC Sales Specialist live.