Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

RFID Security: A Taxonomy of Risk

Published

Author(s)

A Karygiannis, T. Phillips, A. Tsibertzopoulos

Abstract

Radio Frequency Indentification (RFID) and other automated identification technologies (AIT) are being used by government and industry to replace barcodes and existing pen and paper processes in areas such as asset tracking, toll collection, supply chain automation, border and port security, and cargo and container tracking [1]. The diversity and scope of RFID and related technologies makes security an increasingly important consideration. In most implementations, RFID is being used as a core technology to support the automation of business processes that are critical to the success of the organization. Comprehensive threat models, however, do not yet exist for RFID systems, making it difficult for system designers and operators to effectively manage risk. This paper proposes a taxonomy for classifying the security risks associated with RFID systems.
Conference Location
Beijing, CH
Conference Title
First International conference on Communications and Networking

Keywords

privacy, RFID, security, taxonomy

Citation

Karygiannis, A. , Phillips, T. and Tsibertzopoulos, A. (2006), RFID Security: A Taxonomy of Risk, First International conference on Communications and Networking, Beijing, CH (Accessed December 3, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created October 27, 2006, Updated February 19, 2017