上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_陈静远_Security Problems of RFID

Security Problems of RFID Chen Jingyuan 5090309267 Abstract:RFID is a very useful technology nowadays.It has many advantages like its rapid,waterproof,real-time,accurate collection,etc.Certainly,with so many advantages,RFID has some problems revealing through its development.The most important problems must be the security problems.As designers haven't taken the security into account,it has restricted the development of RFID.If RFID's safety can't be ensured,it will bring much loss.So solving the security problems can't wait. Key Words:RFID,Security Problems An RFID system consists of a large number of RFID tags,some RFID readers,and a back-end database.These technical parts enable the collection of any amount of data in any quality on the tagged object or person.This collected information can be searchable and accessible for a clearly defined group of persons or the general public. As RFID develops so fast,we are facing many privacy and security problems to RFID systems.Because of its advantages,RFID is wide-used in many different areas,it seems that solving the security problems has been a very urgent and important thing. Phenomenon There is no access control.Who is allowed to collect data on tagged objects is decided by the person or organization that mounts the tag on the object.But in most time RFID Systems the data on the tag is accessible by anyone who is able to operate a RFID reader.In current RFID applications who is allowed to access certain data is decided by the collector of the data.The collector can keep the data secret and protected.They also can publish it to the public and feed it into lookup and location services.The tag also can be a tracker when a person buy and take the tagged object with him or her.It will threaten personal safety.With the objects people buy,the merchants can easily get what consumers like.On the other hand,people's privacy will be easily exposed.What's more,some application like certifications or finance area,someone can do illegal things through destroy tags or falsify information in tags. It can cause great loss to society. Causes Three problems may be the reasons of RFID's security uninsured. One is the energy problem.RFID tags are mostly passive or half-active,so they can't bring much energy with themselves.When someone has a tag reader,the information in tag will be easy to get. One is the ability of compute,this ability is limited as a tag. Another one is the time,the numbers of agreements is limited,and so time for
Security Problems of RFID Chen Jingyuan 5090309267 Abstract: RFID is a very useful technology nowadays. It has many advantages like its rapid, waterproof, real-time, accurate collection, etc. Certainly, with so many advantages, RFID has some problems revealing through its development. The most important problems must be the security problems. As designers haven’t taken the security into account, it has restricted the development of RFID. If RFID’s safety can’t be ensured, it will bring much loss. So solving the security problems can’t wait. Key Words: RFID, Security Problems An RFID system consists of a large number of RFID tags, some RFID readers, and a back-end database. These technical parts enable the collection of any amount of data in any quality on the tagged object or person. This collected information can be searchable and accessible for a clearly defined group of persons or the general public. As RFID develops so fast, we are facing many privacy and security problems to RFID systems. Because of its advantages, RFID is wide-used in many different areas, it seems that solving the security problems has been a very urgent and important thing. Phenomenon There is no access control. Who is allowed to collect data on tagged objects is decided by the person or organization that mounts the tag on the object. But in most time RFID Systems the data on the tag is accessible by anyone who is able to operate a RFID reader. In current RFID applications who is allowed to access certain data is decided by the collector of the data. The collector can keep the data secret and protected. They also can publish it to the public and feed it into lookup and location services. The tag also can be a tracker when a person buy and take the tagged object with him or her. It will threaten personal safety. With the objects people buy, the merchants can easily get what consumers like. On the other hand, people’s privacy will be easily exposed. What’s more, some application like certifications or finance area, someone can do illegal things through destroy tags or falsify information in tags. It can cause great loss to society. Causes Three problems may be the reasons of RFID’s security uninsured. One is the energy problem. RFID tags are mostly passive or half-active, so they can’t bring much energy with themselves. When someone has a tag reader, the information in tag will be easy to get. One is the ability of compute, this ability is limited as a tag. Another one is the time, the numbers of agreements is limited, and so time for

research the agreements is enough.If the ways of agreements work are be known,the information is revealed to everyone. Solutions We have found some methods to avoid the problems. Kill Tag To let tags loss their function can avoid the track.But it also kills the advantages so that after-sales service can't be done and consumers cannot get information about objects. Renaming Approach An encrypted identifier is itself just a meta-identifier.It is static and,therefore,subject to tracking like any other serial number.To prevent RFID-tag tracking,it is necessary that tag identifiers be suppressed,or that they change over time. Active interference Users can use an equipment to interfere other RFID readers nearby.However,this method will affect other RFID equipments nearby. The Proxying Approach Rather than relying on public RFID readers to enforce privacy protection,consumers might instead carry their own privacy-enforcing devices for RFID. In pace with RFID's development,the security problems will be more and more important,and methods to solve these problems will be much better.RFID will be a perfect tool for us. References Andreas Krisch,RFID Security Issues,European Digital Rights K.Osaka,T.Takagi,K.Yamazaki,and O.Takahashi,An Efficient and Secure RFID Security Method with Ownership Transfer Ari Juels,RFID Security and Privacy:A Research Survey,IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS,VOL.24,NO.2,FEBRUARY 2006, 381-394
research the agreements is enough. If the ways of agreements work are be known, the information is revealed to everyone. Solutions We have found some methods to avoid the problems. Kill Tag To let tags loss their function can avoid the track. But it also kills the advantages so that after-sales service can’t be done and consumers cannot get information about objects. Renaming Approach An encrypted identifier is itself just a meta-identifier. It is static and, therefore, subject to tracking like any other serial number. To prevent RFID-tag tracking, it is necessary that tag identifiers be suppressed, or that they change over time. Active interference Users can use an equipment to interfere other RFID readers nearby. However, this method will affect other RFID equipments nearby. The Proxying Approach Rather than relying on public RFID readers to enforce privacy protection, consumers might instead carry their own privacy-enforcing devices for RFID. In pace with RFID’s development, the security problems will be more and more important, and methods to solve these problems will be much better. RFID will be a perfect tool for us. References Andreas Krisch, RFID Security Issues, European Digital Rights K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, An Efficient and Secure RFID Security Method with Ownership Transfer Ari Juels, RFID Security and Privacy: A Research Survey, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006, 381-394
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_陈勇喆_RFID Technology in Market Forecasting.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_金至卓_RFID and Intelligent Vehicle.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_赵千里_The Adoption of RFID on the Airplane.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_许骁龙_iSPOTS with AC Milan.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_袁冬旸_RFID and the Medical Treatment Field.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_王宇飞_How RFID Changes the World.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_汤哲君_The Application of RFID in Railway Passenger Ticketing System.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_武文汉_Research Report On RFID.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_李昊哲_Research of mobile wallet tech using in Shanghai.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_戴骐倡_Packaging Issues and RFID.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_庞名章_Wal-Mart Report-Tips on Global Logistics and Risk Management.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_周娟_Privacy Problems and RFID in Supply Chain Management.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_刘怡雯_Report on RFID.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_Sophie_AIRLINE BAGGAGE HANDLING.pdf
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_Eliska Nyr nen_RFID Usage in Inventory Management.pdf
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Plan_金至卓_RFID and Smart Car.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Plan_赵千里_The Adoption of RFID in the Airplane.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Plan_周剑鸣_The Applications of RFID on Automobile Logistic Process.pdf
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Plan_Sophie_Airline Baggage Handling & Research Plan.pdf
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Plan_Juliette Jaupitre_RFID Taxi Management.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_Sample Works_Research Report_2012OpenResearch_项祯桢_RFID in Library Case Study Report.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Fall_Barilla SPA(郑周龙).docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Fall_Case_Jam Electronics(贺艺).docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Fall_Case_Wal-Mart Changes Tactics(贺艺).docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Fall_MediTech(郑周龙).docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_Barilla SpA_Barilla SpA 罗岩.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_Barilla SpA_BarillaSPA陶鸿涛.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_Jam Electronics_Jam Electronics 罗岩.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_Jam Electronics_Jam Electronics_杨健.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_Jam Electronics_Jam Electronics_金梦珂.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_Jam Electronics_JamElectronics陶鸿涛.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_Meditech_case study1杨健.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_Meditech_Meditech 陶鸿涛.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_Meditech_Meditech_金梦珂.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_Meditech_Meditech罗岩.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_RFID report_RFID Based Library Management System陶鸿涛.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_RFID report_RFID Ensure Patients' Security-罗岩.doc
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_RFID report_RFID report_杨健.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_RFID report_RFID report_金梦珂.docx
- 上海交通大学:《供应链管理 Supply Chain Management》课程教学资料_Case Studies_SampleWork2013Spring_RFID research plan_research plan.doc