ABSTRACT
Radio frequency identification (RFID) tags containing privacy-sensitive information are increasingly embedded into personal documents (e.g., passports and driver's licenses). The problem is that people are often unaware of the security and privacy risks associated with RFID, likely because the technology remains largely invisible and uncontrollable for the individual. To mitigate this problem, we developed a collection of novel yet simple and inexpensive alternative tag designs to make RFID visible and controllable. This video and demonstration illustrates these designs. For awareness, our tags provide visual, audible, or tactile feedback when in the range of an RFID reader. For control, people can allow or disallow access to the information on the tag by how they touch, orient, move, press, or illuminate the tag (for example, Figure 1 shows a tilt-sensitive RFID tag).
Supplemental Material
- Buettner, M., Prasad, R., Sample, A., et al. RFID sensor networks with the Intel WISP. Proc. of SenSys '08, ACM (2008), 393--394. Google ScholarDigital Library
- Curtin, J., Kauffman, R.J., and Riggins, F.J. Making the 'MOST' out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID. Inf. Technol. and Management 8, 2 (2007), 87--110. Google ScholarDigital Library
- Czeskis, A., Koscher, K., Smith, J.R., and Kohno, T. RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. Proc. of CCS '08, ACM (2008), 479--490. Google ScholarDigital Library
- Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., and O Hare, T. Vulnerabilities in first-generation RFID-enabled credit cards. LNCS 4886, Springer (2008), 2. Google ScholarDigital Library
- Juels, A., Molnar, D., and Wagner, D. Security and Privacy Issues in E-passports. Proc. of SecureComm '05. (2005), 74--88. Google ScholarDigital Library
- King, J. and McDiarmid, A. Where's the beep?: security, privacy, and user misunderstandings of RFID. Proc. of Conf. on Usability, Psychology, and Security, USENIX Assoc. (2008), 1--8. Google ScholarDigital Library
- Koscher, K., Juels, A., Brajkovic, V., and Kohno, T. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. Proc. of CCS '09, ACM (2009), 33--42. Google ScholarDigital Library
- Langheinrich, M. A survey of RFID privacy approaches. Personal and Ubiquitous Computing, (2008). Google ScholarDigital Library
- Nguyen, D.H., Kobsa, A., and Hayes, G.R. An empirical investigation of concerns of everyday tracking and recording technologies. Proc. of Ubicomp '08, ACM (2008), 182--191. Google ScholarDigital Library
- Philipose, M., Smith, J.R., Jiang, B., Mamishev, A., Roy, S., and Sundara-Rajan, K. Battery-free Wireless Identification and Sensing. IEEE Pervasive Computing 4, 1 (2005), 37--45. Google ScholarDigital Library
- Poole, E.S., Dantec, C.A.L., Eagan, J.R., and Edwards, W.K. Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing. Proc. of Ubicomp '08, ACM (2008), 192--201. Google ScholarDigital Library
- Rieback, M., Crispo, B., and Tanenbaum, A. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. Australasian Conference on Information Security and Privacy - ACISP'05, Springer-Verlag (2005), 184--194. Google ScholarDigital Library
- Schmidt, A. Implicit human computer interaction through context. Personal and Ubiquitous Computing 4, 2 (2000), 191--199.Google Scholar
- Selker, E.J. Manually Operated Switch for Enabling and Disabling an RFID card. US Patent 6863220, (2005).Google Scholar
- Smith, J.R., Fishkin, K.P., Jiang, B., et al. RFID-based techniques for human-activity detection. Commun. ACM 48, 9 (2005), 39--44. Google ScholarDigital Library
- Spiekermann, S. and Evdokimov, S. Critical RFID Privacy-Enhancing Technologies. Security & Privacy, IEEE 7, 2 (2009), 56--62. Google ScholarDigital Library
- Want, R. The Magic of RFID. Queue 2, 7 (2004), 40--48. Google ScholarDigital Library
Recommendations
Rethinking RFID: awareness and control for interaction with RFID systems
CHI '10: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsPeople now routinely carry radio frequency identification (RFID) tags - in passports, driver's licenses, credit cards, and other identifying cards - from which nearby RFID readers can access privacy-sensitive information. The problem is that people are ...
RFID Light Bulb: Enabling Ubiquitous Deployment of Interactive RFID Systems
Radio-Frequency Identification (RFID) technology has the potential to provide inexpensive, wireless, battery-free connectivity and interactivity for objects that are traditionally not instrumented. However, these systems have not seen widespread ...
Designing with RFID
TEI '09: Proceedings of the 3rd International Conference on Tangible and Embedded InteractionRadio Frequency Identification (RFID) is a wireless technology that is emerging in consumer products as a method for input and interaction. Although RFID is relatively well known from a technical perspective, the methods and for designing with RFID are ...
Comments