11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

406 RFIDParts <strong>of</strong> an RFID system. Depending on whether the chip is active or passive, the reader can be inches or yards away.• identification chips placed beneath the skin <strong>of</strong> pets• experimental human RFID implants (pioneered byBritish computer scientist Kevin Warwick) <strong>and</strong> nowused by VIP customers in a few nightclubs• tracking goods from original shipment to inventory(Wal-Mart now requires its major suppliers to includeRFID labels with shipments)• scientific sensors, such as seismographic instrumentsPrivacy <strong>and</strong> Security IssuesThe benefits <strong>of</strong> RFID technology are numerous: betterinventory control (see supply chain management); moresecure passports <strong>and</strong> other forms <strong>of</strong> ID; faster, easier accessto transportation systems; <strong>and</strong> potentially, the avoidance <strong>of</strong>A Radio Frequency ID (RFID) “chip” from 3M. RFID is findingmany applications, but has also raised privacy concerns.(3M Corporation)mishaps in hospitals, such as the wrong patient receiving adrug or procedure.However, there are privacy <strong>and</strong> security concerns thatremain to be fully resolved. The primary threat is thatunauthorized persons could illicitly obtain information ortrack people or goods, for purposes ranging from simplelarceny to identity theft. Privacy rights organizations havealso raised concerns that information about consumer purchasescould be used for unwanted marketing (or sold tothird parties), while information about a library patron’sreading habits could trigger unwarranted governmentinvestigations in the name <strong>of</strong> fighting terrorism.There is an incentive to produce RFID cards <strong>and</strong> tagsthat are resistant to unauthorized reading or tampering. Acryptographic protocol can be used such that no informationwill be sent or received unless the reader <strong>and</strong> tag “know” thecorrect keys. Another possibility is to create a device thatcan “jam” reading attempts in the device’s vicinity, perhapsprotecting a customer’s grocery cart from being scanned.Finally, RFID cards can be put inside in a sleeve <strong>of</strong> materialthat blocks the signals. However, cryptographic <strong>and</strong> othersecurity technologies raise the cost <strong>of</strong> RFID devices <strong>and</strong> maymake them impracticable for some applications.In September 2006 the National <strong>Science</strong> Foundationawarded a $1.1 million grant to the RFID Consortium forSecurity <strong>and</strong> Privacy to study potential risks <strong>and</strong> safeguardsfor the technology. That same year a group <strong>of</strong> major corporationstogether with the National Consumers Leaguereleased a draft set <strong>of</strong> st<strong>and</strong>ards <strong>and</strong> guidelines for bestpractices in using RFID, with broader scope than the existingEPC (electronic product code) st<strong>and</strong>ards.Further ReadingEPC Global. Available online. URL: http://www.epcglobalinc.org/.Accessed November 12, 2007.Feder, Barbara. “Guidelines for Radio Tags Aim to Protect BuyerPrivacy.” New York Times, May 1, 2006. Available online.URL: http://query.nytimes.com/gst/fullpage.html?res=9805EFDF113FF932A35756C0A96 09C8B63. Accessed November12, 2007.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!