• Login
    View Item 
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical Engineering and Computer Science
    • EECS Faculty Scholarship
    • Ravi Pendse
    • Conference proceedings
    • View Item
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical Engineering and Computer Science
    • EECS Faculty Scholarship
    • Ravi Pendse
    • Conference proceedings
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    RFID security threats to consumers: Hype vs. reality

    View/Open
    Pendse_2007c (1.100Mb)
    Date
    2007-10-08
    Author
    Rao, Shantanu
    Thanthry, Nagaraja
    Pendse, Ravi
    Metadata
    Show full item record
    Citation
    Rao, S.; Thanthry, N.; Pendse, R.; , "RFID Security Threats to Consumers: Hype vs. Reality," Security Technology, 2007 41st Annual IEEE International Carnahan Conference on , vol., no., pp.59-63, 8-11 Oct. 2007 doi: 10.1109/CCST.2007.4373468
    Abstract
    Radio frequency identification (RFID) tags are being adopted rapidly by retail giants such as Wal-Mart In the near future these tags will be used for item level tracking of consumer products such as milk cartons, television sets, and clothing. While this technology brings many benefits to consumers, such as increased convenience and efficiency through automation, it has also caused a lot of concerns about its potentially adverse impact on consumers' personal privacy. Researchers have theorized various threats relating to clandestine tracking and clandestine inventorying of RFIDs. In this paper the authors research practical security threats to consumers in an RFIO environment The authors study various RFID standards and types of RFID tags that are proposed for consumer products. Initial analysis reveals that not all theoretical security threats translate into practical concerns for consumers' privacy. Based on this analysis the authors build a risk model with which consumers can quantify various threats that RFID poses to their information security and privacy. Such evaluation will assist in creating risk-appropriate threat mitigation strategies in consumer RFID environments.
    Description
    The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954
    URI
    http://hdl.handle.net/10057/3815
    http://dx.doi.org/10.1109/CCST.2007.4373468
    Collections
    • Conference proceedings
    • EECS Research Publications

    Browse

    All of Shocker Open Access RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace software copyright © 2002-2021  DuraSpace
    Contact Us | Send Feedback
    DSpace Express is a service operated by 
    Atmire NV