1 / 14

Privacy and RFID Chips

Privacy and RFID Chips. By Ayesha Begum. Agenda. What is RFID? How does it work? Types of RFID tags RFID’s common uses Benefits of RFID Privacy and Security risks Solutions to privacy threats. What is RFID?.

cormac
Télécharger la présentation

Privacy and RFID Chips

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy and RFID Chips By Ayesha Begum

  2. Agenda • What is RFID? • How does it work? • Types of RFID tags • RFID’s common uses • Benefits of RFID • Privacy and Security risks • Solutions to privacy threats

  3. What is RFID? • Radio frequency Identification: technology that uses radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking. - Wikipedia

  4. How does it work? application server reader tag database Image Courtesy : ISSE

  5. Other points: • Chip size: about a rice grain to about a dime • Costs: 50c to $50 • depends on size, volume, and sophistication

  6. Types of RFID • Based on mobility: • Fixed • Toll tags • Mobile • Handheld readers = reader

  7. Types of RFID (2) • Based on performance: • Active • Battery powered • Long-distance reader • 3-8 years life • Passive • Non battery powered • Short-distance reader • Up to 10 years life

  8. RFID all around you! • RFID credit cards • Employee badges • Toll passes • Passports • Movie tickets

  9. For the common good • patient identification • animal tracking • Electronic Product Code (EPC) • robbery detection

  10. Privacy and Security Risks • Privacy Risks • Rogue scanning • Eavesdropping • Security Risks • Identity theft • Tracking

  11. How realistic is the threat?

  12. Technical Solutions • ‘Kill’ and ‘sleep’ tags • Brute-force methods • Break or tear object • Place cover around object

  13. Other Solutions ? • Educate: not all RFID bad • Demand/support legislation on RFID • Legislate applications, not technology

  14. The last word…

More Related