• About
  • Advertise
  • Contact
Wednesday, April 15, 2026
No Result
View All Result
NEWSLETTER
iotindiana
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotindiana
No Result
View All Result
Home Networking

U.S. officials recommend better RFID security

in Networking
0
SHARES
6
VIEWS
Share on FacebookShare on Twitter

Organizations that use RFID devices should systematically evaluate potential security and privacy risks posed by the technology, U.S. government officials say in a new report detailing best practices for retailers, manufacturers, hospitals and federal agencies.

RFID raises unique security concerns because, unlike a desktop computer or most devices overseen by a company’s network security crew, a single RFID tag may be handled by multiple organizations.

“When you go into RFID, the chain of custody is different,” says Tom Karygiannis, lead author of a 154-page report released by the Department of Commerce’s National Institute of Standards and Technology (NIST). “We’re talking about a global supply chain. You’re working with suppliers, manufacturers, retailers; different organizations may have possession of the merchandise that has the RFID on it throughout the life cycle. This raises new privacy and security risks.”

The publication, titled “Guidelines for Security Radio Frequency Identification (RFID) Systems,” includes recommendations such as the following:

* Use firewalls that separate RFID databases from an organization’s other databases and IT systems.

* Encrypt radio signals when feasible.

* Authenticate approved users of RFID systems.

* Shield RFID tags or tag reading areas with metal screens or films to prevent unauthorized access.

* Use audit procedures, logging and time stamping to help detect security breaches.

* Implement procedures for tag disposal and recycling that permanently disables or destroys sensitive data.

The report was mandated by Congress under the Federal Information Security Management Act of 2002. In addition to usage in the retail industry, RFID devices are matching hospital patients to lab test results and helping track dangerous materials, raising concerns about eavesdropping or unauthorized use.

The federal report includes hypothetical case studies, including one in which a government agency oversees supply chain management of hazardous materials that are handled by a number of organizations during transport. The risks involving RFID are numerous: adversaries could identify and target vehicles containing hazardous materials; eavesdrop on tag transactions to learn the characteristics of the materials; damage or disable a tag, making it easier to steal; or alter sensor or manifest data stored on the tag to undermine business processes.

The suggested solutions include shielding vehicles and containers to prevent electromagnetic emissions, establishing a 100-meter perimeter around storage locations, and using password protection to prevent unauthorized parties from reading tags or changing the information they contain. As a general rule, the report says, tagged items should be identifiable only during embarkation, debarkation and storage, but not during transport.

“The technical challenge is for each person along the supply chain to be able to securely access information related to that particular tag. You have to be authorized and authenticated. It has to be done securely,” Karygiannis says.

Karygiannis, a senior researcher with NIST’s computer security division in Gaithersburg, Md., said the division is trying to stay ahead of the curve on RFID security. For example, its electromagnetics team in Boulder, Colo. is trying to develop ways to detect counterfeit RFID tags, a task that is difficult with today’s technology, he says.

Learn more about this topic

RFID holes create security concerns

03/22/07

Lawmakers working to ban hacked RFID door cards

02/28/07

Battle brewing over RFID chip-hacking demo

02/26/07

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2007 IDG Communications, Inc.

Download Nulled WordPress Themes
Premium WordPress Themes Download
Download Nulled WordPress Themes
Premium WordPress Themes Download
udemy free download
download xiomi firmware
Free Download WordPress Themes
lynda course free download
Tags: U.S. officials recommend better RFID security
Next Post

Sensor-based networks

Recommended

Freedom through surveillance data

3 ‘must-haves’ for successful smartphone and IoT design

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Indiana USA

© 2024 iotindiana.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotindiana.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In