Security of information in RFID systems

Security of information in RFID systems

Topic home

Computer Networks

 By type
 By year

Security of information in RFID systems

    Models, methodologies, and algorithms to handle information securely in RFID systems.

    Radio Frequency IDentification (RFID) is a recently introduced set of technologies that support the identification and tracking of people and goods. An RFID system consists of "electronic labels" (tags) that can exchange information over the air with units equipped with a radio interface (readers). Data collected by the readers is usually stored in a backend database.

    RFID systems are typically used for access control, in the manufacturing of goods, along the supply chain, and in the retail stage. Among the main advantages of using RFID there is the possibility of accessing the tag contents without line of sight and the ability to store additional information on the tag themselves, including, for example, the identifier of a single instance of a product. As a consequence, the information handled by RFID systems is critical for the underlying application.

    We study models, methodologies, and techniques to allow secure handling of information in RFID systems. In particular, we focus on the security of information exchanged between readers and tags and of information stored in the backend.