skip to main content
10.1145/1753846.1753917acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

Visible and controllable RFID tags

Published:10 April 2010Publication History

ABSTRACT

Radio frequency identification (RFID) tags containing privacy-sensitive information are increasingly embedded into personal documents (e.g., passports and driver's licenses). The problem is that people are often unaware of the security and privacy risks associated with RFID, likely because the technology remains largely invisible and uncontrollable for the individual. To mitigate this problem, we developed a collection of novel yet simple and inexpensive alternative tag designs to make RFID visible and controllable. This video and demonstration illustrates these designs. For awareness, our tags provide visual, audible, or tactile feedback when in the range of an RFID reader. For control, people can allow or disallow access to the information on the tag by how they touch, orient, move, press, or illuminate the tag (for example, Figure 1 shows a tilt-sensitive RFID tag).

Skip Supplemental Material Section

Supplemental Material

p3057.mov

mov

34 MB

References

  1. Buettner, M., Prasad, R., Sample, A., et al. RFID sensor networks with the Intel WISP. Proc. of SenSys '08, ACM (2008), 393--394. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Curtin, J., Kauffman, R.J., and Riggins, F.J. Making the 'MOST' out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID. Inf. Technol. and Management 8, 2 (2007), 87--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Czeskis, A., Koscher, K., Smith, J.R., and Kohno, T. RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. Proc. of CCS '08, ACM (2008), 479--490. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., and O Hare, T. Vulnerabilities in first-generation RFID-enabled credit cards. LNCS 4886, Springer (2008), 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Juels, A., Molnar, D., and Wagner, D. Security and Privacy Issues in E-passports. Proc. of SecureComm '05. (2005), 74--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. King, J. and McDiarmid, A. Where's the beep?: security, privacy, and user misunderstandings of RFID. Proc. of Conf. on Usability, Psychology, and Security, USENIX Assoc. (2008), 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Koscher, K., Juels, A., Brajkovic, V., and Kohno, T. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. Proc. of CCS '09, ACM (2009), 33--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Langheinrich, M. A survey of RFID privacy approaches. Personal and Ubiquitous Computing, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Nguyen, D.H., Kobsa, A., and Hayes, G.R. An empirical investigation of concerns of everyday tracking and recording technologies. Proc. of Ubicomp '08, ACM (2008), 182--191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Philipose, M., Smith, J.R., Jiang, B., Mamishev, A., Roy, S., and Sundara-Rajan, K. Battery-free Wireless Identification and Sensing. IEEE Pervasive Computing 4, 1 (2005), 37--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Poole, E.S., Dantec, C.A.L., Eagan, J.R., and Edwards, W.K. Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing. Proc. of Ubicomp '08, ACM (2008), 192--201. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Rieback, M., Crispo, B., and Tanenbaum, A. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. Australasian Conference on Information Security and Privacy - ACISP'05, Springer-Verlag (2005), 184--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Schmidt, A. Implicit human computer interaction through context. Personal and Ubiquitous Computing 4, 2 (2000), 191--199.Google ScholarGoogle Scholar
  14. Selker, E.J. Manually Operated Switch for Enabling and Disabling an RFID card. US Patent 6863220, (2005).Google ScholarGoogle Scholar
  15. Smith, J.R., Fishkin, K.P., Jiang, B., et al. RFID-based techniques for human-activity detection. Commun. ACM 48, 9 (2005), 39--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Spiekermann, S. and Evdokimov, S. Critical RFID Privacy-Enhancing Technologies. Security & Privacy, IEEE 7, 2 (2009), 56--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Want, R. The Magic of RFID. Queue 2, 7 (2004), 40--48. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    CHI EA '10: CHI '10 Extended Abstracts on Human Factors in Computing Systems
    April 2010
    2219 pages
    ISBN:9781605589305
    DOI:10.1145/1753846

    Copyright © 2010 Copyright is held by the author/owner(s)

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 10 April 2010

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • extended-abstract

    Acceptance Rates

    CHI EA '10 Paper Acceptance Rate350of1,346submissions,26%Overall Acceptance Rate6,164of23,696submissions,26%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader