skip to main content
10.1145/1102199.1102205acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Disabling RFID tags with visible confirmation: clipped tags are silenced

Published:07 November 2005Publication History

ABSTRACT

Existing solutions to protect consumer privacy in RFID either put the burden on the consumer or suffer from the very limited capabilities of today's RFID tags. We propose the use of physical RFID tag structures that permit a consumer to disable a tag by mechanically altering the tag in such a way that the ability of a reader to interrogate the RFID tag by wireless mean is inhibited. In "clipped tags", consumers can physically separate the body (chip) from the head (antenna) in an intuitive way. Such a separation provides visual confirmation that the tag has been deactivated. However, a physical contact channel may be used later to reactivate it. Such a reactivation would require deliberate actions on the part of the owner of the RFID tag to permit the reactivation to take place. Thus reactivation could not be undertaken without the owner's knowledge unless the item were either stolen or left unattended. This mechanism enables controlled reuse after purchase, making clipped tags superior to other RFID privacy-enhancing technologies.

References

  1. ARTICLE 29 Data Protection Working Party. Working document on data protection issues related to RFID technology. EU 10107/05/EN WP 105, Jan. 2005. europa.eu.int/comm/internal_market/privacy/docs/wpdocs/2005/wp105_en.pdf.Google ScholarGoogle Scholar
  2. J. Brito. Relax, don't do it: Why RFID privacy concerns are exaggerated and legislation is premature. UCLA Journal of Law and Technology, 8(2), Fall 2004. www.lawtechjournal.com/articles/2004/05_041220_brito.pdf.Google ScholarGoogle Scholar
  3. A. Cavoukian. Tag, you're it: Privacy implications of radio frequency identification (RFID ) technology. Feb. 2004. www.ipc.on.ca/scripts/index_.asp?action=31&P_ID=15007Google ScholarGoogle Scholar
  4. K.P. Fishkin, S. Roy, and B. Jiang. Some methods for privacy in RFID communication. In Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science 3313, pg. 42--53. Springer, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Floerkemeier, R. Schneider, and M. Langheinrich. Scanning with a purpose -- supporting the fair information principles in RFID protocols. In Ubiquitous Computing Systems (UCS 2004), Lecture Notes in Computer Science. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R.A. Fusaro. None of our business? Harvard Business Review, 82(12):33--38, Dec. 2004.Google ScholarGoogle Scholar
  7. A. Juels, R.L. Rivest, and M. Szydlo. The blocker tag: selective blocking of RFID tags for consumer privacy. In Computer and Communication Security (CCS'03), pg. 103--111. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Luckett. The supply chain. BT Technology Journal, 22(3):50--55, July 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. McGinity. RFID: Is this game of tag fair play? Commun. ACM, 47(1):15--18, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Molnar and D. Wagner. Privacy and Security in Library RFID: Issues, Practices, and Architectures. In Computer and Communications Security (CCS'04), pg. 210--219. ACM Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Want. RFID: A key to automating everything. Scientific American, pg. 46--55, Jan. 2004.Google ScholarGoogle Scholar
  12. S. Weis, S. Sarma, R.L. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In Security in Pervasive Computing, Lecture Notes in Computer Science 2802, pg. 201--212. Springer, 2003.Google ScholarGoogle Scholar
  13. A. Weiss. Me and my shadow. ACM netWorker, 7(3):24--30, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Disabling RFID tags with visible confirmation: clipped tags are silenced

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society
      November 2005
      116 pages
      ISBN:1595932283
      DOI:10.1145/1102199

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 November 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Author Tags

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate106of355submissions,30%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader