Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society 2005
DOI: 10.1145/1102199.1102205
|View full text |Cite
|
Sign up to set email alerts
|

Disabling RFID tags with visible confirmation

Abstract: Existing solutions to protect consumer privacy in RFID either put the burden on the consumer or suffer from the very limited capabilities of today's RFID tags. We propose the use of physical RFID tag structures that permit a consumer to disable a tag by mechanically altering the tag in such a way that the ability of a reader to interrogate the RFID tag by wireless mean is inhibited. In "clipped tags", consumers can physically separate the body (chip) from the head (antenna) in an intuitive way. Such a separati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
35
0
1

Year Published

2006
2006
2018
2018

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(37 citation statements)
references
References 9 publications
1
35
0
1
Order By: Relevance
“…More precisely, for privacy and targeted security threats a broad range of technical solutions have been proposed, including killing or temporarily silencing tags, blocking access to unauthorized readers (Juels et al 2003;Rieback et al 2005), relabeling (Inoue and Yasuura 2003) or clipping (Karjoth et al 2005) tags, using pseudonyms (Juels 2004), distance measurements (Fishkin et al 2004) and encryption techniques (Kinoshita et al 2004;Fedhofer et al 2004).…”
Section: Defenses Against Strategic Layer Attacksmentioning
confidence: 99%
“…More precisely, for privacy and targeted security threats a broad range of technical solutions have been proposed, including killing or temporarily silencing tags, blocking access to unauthorized readers (Juels et al 2003;Rieback et al 2005), relabeling (Inoue and Yasuura 2003) or clipping (Karjoth et al 2005) tags, using pseudonyms (Juels 2004), distance measurements (Fishkin et al 2004) and encryption techniques (Kinoshita et al 2004;Fedhofer et al 2004).…”
Section: Defenses Against Strategic Layer Attacksmentioning
confidence: 99%
“…For example, the read-range could be limited by the kill command to 1 mm. By a modified antenna system, we mean both an antenna which changes its range (for example, via clipped tags as in [28]) or simply a system consisting of two antennas. The first antenna has a normal range and it gets disabled upon the tag receiving the kill command whereas the second antenna has a very short range and it is not affected by the kill command.…”
Section: Sticky Tags and Privacymentioning
confidence: 99%
“…By changing-tag systems, we mean systems in which the tag or tags change physically. Examples are the works presented in [19,28] as well as [6]. The work in [19] is interesting in that they suggest to physically split the IDs of RFID tags.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although solutions that prevent a (clandestine) reader to communicate with tags at the physical layer exist (e.g., tag kill and sleep functions, Faraday cages, active jammers, and "clipped" tags [18]), the provided privacy comes at the price of tag functionality (e.g., the kill function permanently disables tags and therefore possible after-sales services or long-term deployments) or requires additional efforts (e.g., user interaction or extra hardware) that could make those solutions impractical and unattractive.…”
Section: Introductionmentioning
confidence: 99%