How Secure is your RFID Solution?

— April 01, 2008

One day not too long ago, I brought the supply chain to an end for a multi-billion dollar organization. I cut the RFID tag out of a pair of new jeans.

There was no label on the tag to identify it as an RFID tag. It was not in a readily noticeable location. But there it was, a piece of white fabric two inches square and attached to a seam. All it had printed on it was a dotted line and the words "Cut Here." But cut what?

As an information security and privacy professional, I understand the implications of RFID tags for individuals and organizational supply chains. But would a consumer unfamiliar with RFID tags really cut it off just because it says "Cut Here?" It would be comparable to the individual who picks up the phone because the caller ID says "Pick Up" even though it displays an unknown number. (Admit it, you've picked up at least one of these calls, it's human nature.)

If you're unfamiliar with RFID technology, or are not as familiar with it as you'd like to be, download a free copy of the National Institute of Standards and Technology (NIST) Special Publication 800-98 Guidelines for Securing Radio Frequency Identification (RFID) Systems (http://csrc.nist.gov/publications/nistpubs/800-98/SP800-98_ RFID-2007.pdf)


 What you will learn are the components that make up an RFID-enabled supply chain and how to properly deploy RFID technology in your organization. You will also be provided with an introduction to how an organization's RFID use  can effect the privacy of individual consumers.

RFID technology has many uses beyond supply chain management, including access control to facilities (or your car) and automated payment, among others. No matter the specific RFID implementation deployed, it is imperative to understand the security and privacy ramifications of the technology.

Does your company care if someone copies the data contained in an RFID tag and then uses the copied data to make fraudulent purchases? How about unauthorized individuals entering a secure facility with a copy of a legitimate access badge that belongs to an employee? The actual employee would never know her RFID tag data had been compromised. Data can be copied off an RFID tag without having physical ownership of the device. Would potential customers modify their purchases if they knew that they could be personally tracked by the RFID tag your company placed on a product?

Do not simply deploy an RFID solution based on marketing materials. Conduct your own due diligence and address security and privacy aspects of RFID use.

From a supply chain perspective, RFID tags may one day effectively "self-destruct" by rendering the data contained therein unusable. Until then, don't forget to "Cut Here."

Ben Halpert, CISSP, is an information security researcher and practitioner and writes monthly about security. Comments, questions and requests can be sent to him at editor@mobileenterprisemag.com; please include SECURITY in the subject line.

POST A COMMENT

comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

12345
Current rating: 0 (0 ratings)

MOST READ STORIES

topics

Must See


FEATURED REPORT

Tablets in the Enterprise

Justifying the addition of another device to the mobile stack became a challenge as the popularity of tablets grew, along with the adaptability and appropriateness for the field. Now, there is no question. Tablets are here to stay and they are enabling the business more than ever.