RFID Implementation and Security Issues

  • Young B. Choi
  • Tae Hwan Oh
  • Rajath Chouta
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 200)


Radio Frequency Identification (RFID) is a technology that uses electronic tags to store data which in turn can be accessed in real time wirelessly. There is great potential for RFID technology in our society. RFID tags can be used for supply chain management, inventory systems, animal tracking, instant payments or even human implantation. Standards in the RFID industry are examined with an emphasis place on global standardizing bodies. With the growing use of RFID devices in supply chain management and global shipping, several shipping standards including EPC and ASN are examined. Security has become a major concern with several threats to RFID technology recently exposed. Several solutions are presented for firms wishing to implement RFID technology and minimize the risk to sensitive information and company systems.


Radio Frequency Identification Security Issues RFID Security Issues RFID problems 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Asahi, T., Yamato, J.: MIT Auto-ID Center Advances the Standardization of RFID Tags. Global Standardization Activities 1, 95–97 (2003)Google Scholar
  2. 2.
    Baard, M.: RFID: Sign of the (End) Times? (2006),
  3. 3.
    Bhatt, H., Glover, B.: RFID Essentials. O’Reilly Media, Inc., Sebastopol (2006)Google Scholar
  4. 4.
    Brown, M., Sabella, R., Zeisel, E.: RFID + Exam Cram. Que Publishing, Indiana (2006)Google Scholar
  5. 5.
    Campbell, A., Das, A., Haines, B., Kleinschmidt, J., Thornton, F.: RFID Security. Syngress Publishing, Canada (2006)Google Scholar
  6. 6.
    CDT Working Group on RFID: Privacy Best Practices for Deployment of RFID Technology,
  7. 7.
    EPCglobal Inc. - The EPCglobal Architecture Framework (2007),
  8. 8.
    Gralla, P.: How Personal & Internet Security Work. Que Publishing, Indiana (2006)Google Scholar
  9. 9.
    Grunwald, L.: What is RFDump (2002),
  10. 10.
    Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Kim, J.: RFID Technology and Private Issues. KSEA Letters 36(2), 45–51 (2008)Google Scholar
  12. 12.
    Knospe, H., Pobl, H.: RFID Security. Information Security Technical Report 9, 39–49 (2004)CrossRefGoogle Scholar
  13. 13.
  14. 14.
    Phillips, T., Karygiannis, T., Huhn, R.: Security Standards for the RFID Market. IEEE Security and Privacy 3, 85–89 (2005)CrossRefGoogle Scholar
  15. 15.
    So, S.C.K., Lui, J.J.: Securing RFID Applications: Issues, Methods, and Controls. Information Security Journal: A Global Perspective 15(4), 43–50 (2006)Google Scholar
  16. 16.
    Radio-frequency identification (n.d),
  17. 17.
    Radio Frequency Identification (RFID) Systems,
  18. 18.
  19. 19.
    RFID Consumer Applications and Benefits,
  20. 20.
    Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The Evolution of RFID Security. Pervasive Computing 5(1), 62–69 (2006)CrossRefGoogle Scholar
  21. 21.
    Reiback, M., Crispo, B., Tanenbaum, A.: The Evolution of RFID Security. IEEE Pervasive Computing 5, 62–69 (2006)CrossRefGoogle Scholar
  22. 22.
    Reiback, M., Crispo, B., Tanenbaum, A.: RFID Malware: Truth vs. Myth. IEEE Security and Privacy 4, 70–72 (2006)CrossRefGoogle Scholar
  23. 23.
  24. 24.
  25. 25.
  26. 26.
    Fuqua, M.: Is RFID Getting Primed To Change Digital Marketing?,
  27. 27.
    Cho, N.: New US High Tech E-passport,
  28. 28.
    Jukes, I.: Phones, Paper ‘Chips’ May Fight Disease,
  29. 29.
    Phillips, T., Karygiannis, T., Kuhn, R.: Security Standards for the RFID Market. IEEE Security & Privacy 3(6) (November/December 2005)Google Scholar
  30. 30.
    Grunwald, L.: RFDump can hack RFID tags,
  31. 31.
    So, S.C.K., Liu, J.J.: Securing RFID Applications: Issues, Methods, and Controls. Information Systems Security, 43–50 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Young B. Choi
    • 1
  • Tae Hwan Oh
    • 2
  • Rajath Chouta
    • 2
  1. 1.Department of Natural Science, Mathematics and Technology, School of Undergraduate Studies, RH 464Regent UniversityVirginia Beach
  2. 2.Department of Networking, Security and Systems Administration, Golisano College of Computing and Information SciencesRochester Institute of TechnologyRochester

Personalised recommendations