Page 194 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 194

Information  Security and Privacy




                    Notes          Commercialized chips became widely available in the ’80s, and RFID tags were being used to
                                   track difficult-to-manage property like farm animals and railroad cars. But over the last few
                                   years, the market for RFIDs has exploded, driven by advances in computer databases and declining
                                   chip prices.  Now  dozens  of  companies,  from  Motorola  to  Philips  to  Texas  Instruments,
                                   manufacture the chips.
                                   The tags work by broadcasting a few bits of information to specialized electronic readers. Most
                                   commercial RFID chips are passive emitters, which mean they have no on-board battery. They
                                   send a signal only when a reader powers them with a squirt of electrons.
                                   Once juiced, these chips broadcast their signal indiscriminately within a certain range, usually a
                                   few inches to a few feet. Active emitter chips with internal power can send signals hundreds of
                                   feet; these are used in the automatic toll-paying devices (with names like FasTrak and E-ZPass)
                                   that sit on car dashboards, pinging tollgates as autos whiz through.
                                   For protection, RFID signals can be encrypted.


                                          Example: The chips that will go into US passports will likely be coded to make it difficult
                                   for unauthorized readers to retrieve their on-board information (which will include a person’s
                                   name, age, nationality, and photo).
                                   But most commercial RFID tags don’t include security, which is expensive: A typical passive
                                   RFID chip costs about a quarter, whereas one with encryption capabilities runs about $5. It’s just
                                   not cost-effective for your average office building to invest in secure chips.
                                   This leaves most RFIDs vulnerable to cloning or – if the chip has a writable memory area, as
                                   many do – data tampering.


                                          Example: Chips  that track product shipments  or expensive equipment, for example,
                                   often contain pricing and item information. These writable areas can be locked, but often they
                                   aren’t, because the companies using RFIDs don’t know how the chips work or because the data
                                   fields need to be updated frequently. Either way, these chips are open to hacking.



                                     Did u know? Full form of RFID
                                     Radio Frequency Identification





                                      Task  Illustrate the functioning of RFID chips.

                                   13.1.1 Privacy  Aspects

                                   Impending risks to privacy are usually significant issues for  individuals and organizations.
                                   Main traits and functionalities of RFID technologies have the potential to provide advantages
                                   (such as convenience, expediting processes) in addition to foster misperceptions and to impact
                                   privacy. RFID systems  that gather data associated to identifiable  individuals raise particular
                                   privacy issues that should be regarded as a priority challenge to the acceptance of the technology
                                   in a huge number of regions. In many cases, the potential attack of privacy via the use of RFID
                                   is based on both the technology accessed and the context. Invisibility of the data compilation
                                   may be the primary trait of RFID that raises concerns. It is also a risk multiplier for the possible
                                   privacy challenges connected  with the use of the technology.  RFID might disclose to  third




          188                               LOVELY PROFESSIONAL UNIVERSITY
   189   190   191   192   193   194   195   196   197   198   199