Keep on Blockin’ in the Free World

(Transcript of Discussion)
  • Melanie R. Rieback
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4631)


I am here today to talk about some of the security implications of Radio Frequency Identification. RFID tags are remotely-powered data carriers that resemble the theft control tags that you might find in a sweater when buying clothing from a store. Like theft-control tags, RFID tags are powered and accessed from a distance using radio waves, but RFID tags differ from theft-control tags in that they tend to have more storage space and processing power. RFID tags have security issues that have been exposed in the past few years. The heart of the problem is that RFID tags don’t usually support cryptography, plus RFID application scenarios are usually not conducive to commonly performed security operations like key management; in fact, many security and privacy issues that generally exist in ubiquitous computing reappear in RFID applications specifically.


Access Control Access Control Policy Electronic Product Code Free World Access Control List 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Melanie R. Rieback
    • 1
  1. 1.Computer Systems Group, Vrije Universiteit, AmsterdamThe Netherlands

Personalised recommendations