skip to main content
10.1145/948109.948126acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

The blocker tag: selective blocking of RFID tags for consumer privacy

Published:27 October 2003Publication History

ABSTRACT

We propose the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing.While an ordinary RFID tag is a simple, cheap (e.g. five-cent) passive device intended as an "electronic bar-code" for use in supply-chain management, a blocker tag is a cheap passive RFID device that can simulate many ordinary RFID tags simultaneously. When carried by a consumer, a blocker tag thus "blocks" RFID readers. It can do so universally by simulating all possible RFID tags. Or a blocker tag can block selectively by simulating only selected subsets of ID codes, such as those by a particular manufacturer, or those in a designated "privacy zone.We believe that this approach, when used with appropriate care, provides a very attractive alternative for addressing privacy concerns raised by the potential (and likely) widespread use of RFID tags in consumer products.We also discuss possible abuses arising from blocker tags, and means for detecting and dealing with them.

References

  1. Benetton undecided on use of 'smart tags'. Associated Press, 8 April 2003.Google ScholarGoogle Scholar
  2. D.L. Brock. The electronic product code (EPC): A naming scheme for objects. Technical Report MIT-AUTOID-WH-002, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org.Google ScholarGoogle Scholar
  3. Security technology: Where's the smart money? The Economist, pages 69--70. 9 February 2002.Google ScholarGoogle Scholar
  4. D.M. Ewatt and M. Hayes. Gillette razors get new edge: RFID tags. Information Week, 13 January 2003. Available at http://www.informationweek.com/story/IWK20030110S0028.Google ScholarGoogle Scholar
  5. S. Garfinkel. An RFID Bill of Rights. Technology Review, page~35, October 2002.Google ScholarGoogle Scholar
  6. P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal re-encryption for mixnets, 2002. In submission.Google ScholarGoogle Scholar
  7. A. Juels and R. Pappu. Squealing Euros: Privacy protection in RFID-enabled banknotes. In R. Wright, editor, Financial Cryptography '03. Springer-Verlag, 2003. To appear.Google ScholarGoogle ScholarCross RefCross Ref
  8. D. McCullagh. RFID tags: Big Brother in small packages. CNet, 13 January 2003. Available at http://news.com.com/2010-1069-980325.html.Google ScholarGoogle Scholar
  9. mCloak: Personal / corporate management of wireless devices and technology, 2003. Product description at www.mobilecloak.com.Google ScholarGoogle Scholar
  10. R. Pappu, 2003. Personal communication.Google ScholarGoogle Scholar
  11. Prada's smart tags too clever? Wired News, 27 October 2002.Google ScholarGoogle Scholar
  12. S. E. Sarma, S. A. Weis, and D.W. Engels. Radio-frequency identification systems. In Burton S. Kaliski Jr., Cetin Kaya Koc, and Christof Paar, editors, CHES '02, pages 454--469. Springer-Verlag, 2002. LNCS no. 2523. Google ScholarGoogle Scholar
  13. S. E. Sarma, S. A. Weis, and D.W. Engels. RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT, 2002.Google ScholarGoogle Scholar
  14. S. E. Sarma, S. A. Weis, and D.W. Engels. Radio-frequency-identification security risks and challenges. CryptoBytes, 6(1), 2003.Google ScholarGoogle Scholar
  15. S.E. Sarma. Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org.Google ScholarGoogle Scholar
  16. R. Shim. Benetton to track clothing with ID chips. CNET, 11 March 2003. URL: http://news.com.com/2100-1019-992131.html.Google ScholarGoogle Scholar
  17. K. Takaragi, M. Usami, R. Imura, R. Itsuki, and T. Satoh. An ultra small individual recognition security chip. IEEE Micro, 21(6):43--49, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. A. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In First International Conference on Security in Pervasive Computing, 2003. To appear.Google ScholarGoogle Scholar
  19. S.A. Weis. Radio-frequency identification security and privacy. Master's thesis, M.I.T. June 2003 (expected).Google ScholarGoogle Scholar
  20. J. Yoshida. Euro bank notes to embed RFID chips by 2005. EE Times, 19 December 2001. Available at http://www.eetimes.com/story/OEG20011219S0016.Google ScholarGoogle Scholar

Index Terms

  1. The blocker tag: selective blocking of RFID tags for consumer privacy

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
      October 2003
      374 pages
      ISBN:1581137389
      DOI:10.1145/948109

      Copyright © 2003 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 October 2003

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader