BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
1.1 Introduction<br />
CHAPTER 1<br />
INTRODUCTION<br />
An RFID (Radio Frequency IDentification) Reader is a device whose primary<br />
purpose is to read the identifier stored on all RFID tags located near it. Reader<br />
communicates this Tag identifier to the backend information system. RFID is widely<br />
deployed in the supply chain industry. It is becoming more ubiquitous by the day.<br />
This is good for achieving the applications and such from the Internet of Things<br />
but it poses significant security and privacy concerns for individuals since the most<br />
widely deployed tags are promiscuous. This means that a person may be easily<br />
tracked without their knowledge or their consent. So how secure is the RFID wireless<br />
communication? Will the Tags communicate only to authorized Readers. Security<br />
and Privacy is an important issue in RFID systems. Low cost RFID readers will enable<br />
widely anticipated benefits, and they will also be the source of security protecting<br />
our privacy as we wonder through this ubiquitously connected world of our future.<br />
Different companies have come up with there own methods of providing security and<br />
privacy. It is astonishing how a modest device like an RFID tag essentially just a<br />
wireless license plate, can give rise to the complex melange of security and privacy<br />
problems [24]. There are some research done in providing privacy. Juels offers a survey<br />
of these problems in his paper[24]. Blocker Tag is one possible solution mentioned in<br />
his paper [6]. Also S.A. Weis proposes several security mechanisms to make the Tags<br />
smarter [44].<br />
1