Advertisement

Characteristics and Limitations of Conventional RFIDs

  • Faranak Nekoogar
  • Farid Dowla
Chapter

Abstract

Although RFID technology has been proven to be sufficiently adequate for some applications, such as toll collection and anti-theft systems, there are numerous other applications that cannot benefit from this technology due to some of the limitations of the conventional RFID technologies. With the widespread interest and usage of RFIDs, the vulnerabilities of current RFID systems are becoming apparent. These limitations are directly related to the environment that the tags and readers ­communicate. This environment consists of both the wireless channel and the physical object that the tags are attached to. Various objects and systems in the wireless channel can cause a range of signal degradation such as attenuation, ­multipath fading, and interference to the RF signal carrying the tag information. Since the reliability of an RFID system is directly dependent on the robustness of the tag-reader RF link, the signaling scheme becomes a fundamental area of study for characterization and further performance improvement of such systems.

Keywords

Metallic Object Read Range Narrowband Signaling Reader Antenna Unauthorized Reader 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    “Ultra-Wideband Communications – Fundamentals and Applications”, F. Nekoogar, Prentice Hall PTR, Aug. 2005. ISBN: 0131463268.Google Scholar
  2. 2.
    M. Eunni, “A Novel Planar Microstrip Antenna Design for UHF RFID”, Master’s Thesis defense, 2006.Google Scholar
  3. 3.
  4. 4.
  5. 5.
  6. 6.
    DN-Systems: BBC Reports on Cloning of the new e-passport. In: http://www.dnsystems.de/press/document.2007-01-04.2112016470.
  7. 7.
    M. Hlavac, T. Rosa, “A Note on the Relay Attacks on e-passports? The Case of Czech e-passports”. In http://eprint.iacr.org/2007/244.pdf.
  8. 8.
  9. 9.
  10. 10.
    D. Yee, “RFID – moving beyond compliance…”, RFID Summit Singapore (2004).Google Scholar
  11. 11.
    D. Brown, “RFID Implementation”, ISBN-13: 978–0072263244.Google Scholar
  12. 12.
    K. Ramakrishnan “Performance Benchmarks for Passive UHF RFID Tags” Master’s Thesis, University of Kansas, 2003.Google Scholar
  13. 13.
    D. Deavours, “UHF EPC Tag Performance Evaluation” a production of RFID Alliance Lab, May 2005.Google Scholar

Bibliography

  1. J.D. Taylor, Ed. Introduction to Ultra-wideband Radar Systems, (Boca Raton, FL. CRC Press, 1995).Google Scholar
  2. Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: Patrick, A., Yung,M. (eds.). In: Proc. of the Ninth Int’l Conf. on Financial Cryptography and Data Security (FC’05), Lecture Notes in Computer Science, Vol. 3570. (2005) 125–140.Google Scholar
  3. Center, A.I.: 900 MHz Class 0 Radio Frequency (RF) Identification Tag Specifications. In: Draft,www.epcglobalinc.org/standards/specs/900MHzClass0RFIDTagSpecification.pdf.
  4. Bolotnyy, L., Robins, G.: Physically Unclonable Function-Based Security and Privacy in RFID Systems. In: Proc. of PerCom’07. New York, USA (2007) 211–220.Google Scholar
  5. “Performance Benchmarks for Passive UHF RFID Tags” Master’s Thesis by Karthik Ramakrishnan, University of Kansas, 2003.Google Scholar
  6. Juels, A.: Stengthening EPC Tags Against Cloning. In: Proc. of ACMWorkshop onWireless Security (WiSe’05). ACM Press (2005) 67–76.Google Scholar
  7. Burton, G.J., Ohlke, G.P., (May 2000), Exploitation of millimeter waves for through-wall surveillance during military operations in urban terrain, Land Force Technical Staff Programme, Royal Military College of Canada, Kingston, Ontario.Google Scholar
  8. CDT Working Group on RFID: Privacy Best Practices for Deployment of RFID Technology. In: Interim Draft, http://www.cdt.org/privacy/20060501rfid-best-practices.php, (2006).
  9. Dimitriou, T.: A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks. In: Proc. of IEEE Conf. on Security and Privacy for Emerging Areas in Communication Networks, (2005).Google Scholar
  10. Emvelope: Products. In: http://www.emvelope.com/products. (2008).
  11. EPCGlobal: Guidelines on EPC for Consumer Products. In: http://www.epcglobalinc.org/public/ppscguide, (2005).
  12. EPCGlobal: Class-1 generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz. In: EPC Radio-Frequency Identity Protocols, Vol. 1.1.0, (2005).Google Scholar
  13. Fedhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Proc. of Cryptographic Hardware and Embedded Systems (CHES’04), Vol. 3156. Lecture Notes in Computer Science. (2004) 357–370.Google Scholar
  14. Fishkin, K., Roy, S., Jiang, B.: SomeMethods for Privacy in RFID Communication. In: Proc. of the 1st European Workshop on Security (2004) 42–53.Google Scholar
  15. Friedl, S.: SQL Injection attacks by example. In: http://www.unixwiz.net/techtips/sqlinjection.html, (2007).
  16. Garfinkel, S., Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed Solutions. In: IEEE Security & Privacy, Vol. 3. (2005) 34–43.Google Scholar
  17. Hancke, G., Kuhn, M.: An RFID Distance Bounding Protocol. In: Proc. of the 1st Int’l Conf. on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005) (2005) 67–73.Google Scholar
  18. ICAO. ICAO Document 9303. In: http://mrtd.icao.int/content/view/33/202, (2006).
  19. Inoue, S., Yasuura, H.: RFID Privacy Using User-Controllable Uniqueness. In: Proc. of RFID Privacy Workshop. MIT, Massachusetts, USA (2003).Google Scholar
  20. Juels, A.: Minimalist Cryptography for Low-cost RFID Tags. In: Proc. of the 4th Conf. on Security in Communication Networks (SCN’04), Vol. 3352. Lecture Notes in Computer Science. Springer-Verlag (2004) 149–164.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Lawrence Livermore National LaboratoryLivermoreUSA

Personalised recommendations