Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Mobile
    • Networking

    Mr. RFID Discusses RFID Security

    Written by

    Eric Lundquist
    Published March 23, 2006
    Share
    Facebook
    Twitter
    Linkedin

      BOSTON—I caught up with Kevin Ashton just as he was getting back into Boston following a red-eye flight.

      Kevin is currently the vice president of marketing at RFID vendor ThingMagic in Cambridge, Mass. Moreover, he was one of the co-founders of MITs Auto-ID Center, and was an associate director at Proctor and Gamble.

      Hes about as close to “Mr. RFID” as you are going to find.

      I figured he would be good and grumpy after an all-night flight and ready to take on the two big current questions regarding RFID security: Is it really that easy to introduce an errant virus into an RFID network via a rogue chip, and can the power signals running between an RFID chip and the reader be intercepted for nefarious purposes? He was ready for both questions.

      “The Dutch kids with the RFID paper? That was just a piece of rubbish, frankly. They treated data as it was code, which no one would do. It would be like driving a car with a blindfold and then concluding that all cars were unsafe,” said Ashton.

      Ashton, rising to the topic, blamed the wide play the researchers from Vrije University received on the confluence of the topics RFID and security that stirred the media interest.

      “The most important aspect of RFID security is to implement security practices that already exist for other kinds of network technology. Ninety-nine percent of security concerns in RFID can be addressed by existing technology. They are solved problems,” Ashton said.

      No standard corporate security practices or information professionals would confuse data with code as the Vrije researchers did, Ashton contends.

      So, toss out the Dutch paper, but what about the ability to intercept RFID signals as was implied by Adi Shamir? That type of intercept presents more of a challenge, said Ashton.

      /zimages/2/28571.gifTo read more about Dutch researchers creating RFID malware, click here.

      “The more interesting problems are how to secure the connection between the tag and the reader,” Ashton said.

      He explained that RFID systems are tremendously asymmetric. The chips, in order to be low-cost, are extremely simple and “dumb,” while the readers have a lot of computing horsepower.

      Two other factors come into the security consideration.

      /zimages/2/28571.gifClick here to read more insight about RFID security from Eric Lundquist.

      First, the nature of communicating is in the open air which is difficult to secure.

      Second, the “very nature of an RFID tag is to be promiscuous and to talk to anyone,” he said.

      Combine those factors with the speed with which tagged products move through the manufacturing and distribution channels and the potential of billions of tagged products being tracked, and concepts such as encryption of two key identification have to be tossed out as too slow and too unwieldy.

      The answer, Ashton contends, lies in keeping the tagged data simple and exactly defined by parameters, while “putting all the interesting and secret stuff on the network where you can protect it more easily.”

      The remaining issue is how to allow the RFID chips to keep their unique identifiers (electronic product code) but not allow them to be easily identified by unauthorized readers.

      Just as you can identify a Boston area phone number by its 617 area code, unique identifiers can provide more information than a company might want to provide.

      Random numbers as identifiers might be an answer, said Ashton.

      While security is certainly a consideration, equally important right now in RFID deployments are location and organization.

      RFID systems are often destined to be deployed in areas where IT infrastructure often has not existed, including warehouses and remote manufacturing plants.

      And as few companies have RFID departments, trying to determine who is in charge of evaluation, deployment and budgets is a corporate consideration just now being undertaken.

      While location and organization may be equal or greater considerations than security, in RFID the security issue is the one that gets the headlines, Ashton said.

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest news, reviews and analysis on mobile and wireless computing.

      Eric Lundquist
      Eric Lundquist
      Since 1996, Eric Lundquist has been Editor in Chief of eWEEK, which includes domestic, international and online editions. As eWEEK's EIC, Lundquist oversees a staff of nearly 40 editors, reporters and Labs analysts covering product, services and companies in the high-technology community. He is a frequent speaker at industry gatherings and user events and sits on numerous advisory boards. Eric writes the popular weekly column, 'Up Front,' and he is a confidant of eWEEK's Spencer F. Katt gossip columnist.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×