ABSTRACT
We propose the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing.While an ordinary RFID tag is a simple, cheap (e.g. five-cent) passive device intended as an "electronic bar-code" for use in supply-chain management, a blocker tag is a cheap passive RFID device that can simulate many ordinary RFID tags simultaneously. When carried by a consumer, a blocker tag thus "blocks" RFID readers. It can do so universally by simulating all possible RFID tags. Or a blocker tag can block selectively by simulating only selected subsets of ID codes, such as those by a particular manufacturer, or those in a designated "privacy zone.We believe that this approach, when used with appropriate care, provides a very attractive alternative for addressing privacy concerns raised by the potential (and likely) widespread use of RFID tags in consumer products.We also discuss possible abuses arising from blocker tags, and means for detecting and dealing with them.
- Benetton undecided on use of 'smart tags'. Associated Press, 8 April 2003.Google Scholar
- D.L. Brock. The electronic product code (EPC): A naming scheme for objects. Technical Report MIT-AUTOID-WH-002, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org.Google Scholar
- Security technology: Where's the smart money? The Economist, pages 69--70. 9 February 2002.Google Scholar
- D.M. Ewatt and M. Hayes. Gillette razors get new edge: RFID tags. Information Week, 13 January 2003. Available at http://www.informationweek.com/story/IWK20030110S0028.Google Scholar
- S. Garfinkel. An RFID Bill of Rights. Technology Review, page~35, October 2002.Google Scholar
- P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal re-encryption for mixnets, 2002. In submission.Google Scholar
- A. Juels and R. Pappu. Squealing Euros: Privacy protection in RFID-enabled banknotes. In R. Wright, editor, Financial Cryptography '03. Springer-Verlag, 2003. To appear.Google ScholarCross Ref
- D. McCullagh. RFID tags: Big Brother in small packages. CNet, 13 January 2003. Available at http://news.com.com/2010-1069-980325.html.Google Scholar
- mCloak: Personal / corporate management of wireless devices and technology, 2003. Product description at www.mobilecloak.com.Google Scholar
- R. Pappu, 2003. Personal communication.Google Scholar
- Prada's smart tags too clever? Wired News, 27 October 2002.Google Scholar
- S. E. Sarma, S. A. Weis, and D.W. Engels. Radio-frequency identification systems. In Burton S. Kaliski Jr., Cetin Kaya Koc, and Christof Paar, editors, CHES '02, pages 454--469. Springer-Verlag, 2002. LNCS no. 2523. Google Scholar
- S. E. Sarma, S. A. Weis, and D.W. Engels. RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT, 2002.Google Scholar
- S. E. Sarma, S. A. Weis, and D.W. Engels. Radio-frequency-identification security risks and challenges. CryptoBytes, 6(1), 2003.Google Scholar
- S.E. Sarma. Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org.Google Scholar
- R. Shim. Benetton to track clothing with ID chips. CNET, 11 March 2003. URL: http://news.com.com/2100-1019-992131.html.Google Scholar
- K. Takaragi, M. Usami, R. Imura, R. Itsuki, and T. Satoh. An ultra small individual recognition security chip. IEEE Micro, 21(6):43--49, 2001. Google ScholarDigital Library
- S. A. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In First International Conference on Security in Pervasive Computing, 2003. To appear.Google Scholar
- S.A. Weis. Radio-frequency identification security and privacy. Master's thesis, M.I.T. June 2003 (expected).Google Scholar
- J. Yoshida. Euro bank notes to embed RFID chips by 2005. EE Times, 19 December 2001. Available at http://www.eetimes.com/story/OEG20011219S0016.Google Scholar
Index Terms
- The blocker tag: selective blocking of RFID tags for consumer privacy
Recommendations
Soft blocking: flexible blocker tags on the cheap
WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic societyA "blocker" tag is a privacy-enhancing radio-frequency identification (RFID) tag. It operates by interfering with the protocol in which a reader communicates individually with other RFID tags. While inexpensive to manufacture in quantity, blockers are ...
Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems
CYBERC '13: Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge DiscoveryIn this paper we present methods of protecting RFID tags users' privacy. Based on well-known technique by Juels et al. called Blocker tag we introduce a set of methods for increasing security using a device called Hedgehog blocker. Hedgehog blocker ...
Lightweight Cryptography for RFID Tags
RFID tags pose privacy risks that have only been somewhat addressed. Achieving acceptable levels of security and privacy will require a combination of software and hardware solutions.
Comments