Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Pervasive computing goes the last 100 feet with RFID systems
Stanford V. IEEE Pervasive Computing2 (2):9-14,2003.Type:Article
Date Reviewed: Apr 12 2005

Radio frequency identification (RFID) is one element of ubiquitous computing. It is also a highly publicized technology, receiving an unprecedented amount of attention from research, business, and privacy watch groups. The capabilities, range, applications, standards, hype, and security/privacy concerns of RFID have only increased since this paper appeared in mid-2003. The author presents a broad overview of and introduction to the technology, the potential applications of it, and some of the security/privacy concerns surrounding its use and deployment.

The potential uses for passive, semi-active, and active RFID are vast and varied. The author enumerates several of the most popular uses; however, these devices are finding their way into ever more obscure applications. This is especially true when the capabilities expand and cross over into sensor network scenarios. The standards, communication, and security capabilities of RFID have progressed a great deal from those noted in this paper, given the brief amount of time that has elapsed.

With regard to security and privacy concerns, the outrage over item-level tagging noted in the paper has spurred industry to adopt “kill-tag” capabilities. However, this is far from the only, or most invasive, security concern. Indeed, since the paper was published, such wide-scale systems as ExxonMobil’s SpeedPass have been vulnerable to cryptographic attacks [1].

If this paper is able to raise awareness of the security and privacy issues that are becoming apparent in RFID systems, it has served a valuable purpose. Too many papers on the topic expound the virtues of RFID, while glossing over the inherent risks in identifying and exposing so much information in the digital world.

Reviewer:  Kipp Jones Review #: CR131103 (0510-1115)
1) Bono,S. Green,M. Stubblefield,A. Rubin,A. Analysis of the Texas Instruments DST RFID Johns Hopkins University http://rfidanalysis.org/ (03/17/2000).
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Introductory And Survey (A.1 )
 
 
Security and Protection (C.2.0 ... )
 
 
Wireless Communication (C.2.1 ... )
 
 
General (C.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Introductory And Survey": Date
Computer science: an overview (3rd ed.)
Brookshear J., Benjamin-Cummings Publ. Co., Inc., Redwood City, CA, 1991. Type: Book (9780805302646)
Feb 1 1992
Computers and applications with Basic
Slotnick D., Butterfield E., Colantonio E., Kopetzky D., Slotnick J., D. C. Heath and Company, Lexington, MA, 1990. Type: Book (9780669217537)
Dec 1 1991
Computers
Wear L., Pinkert J., Wear L., Lane W., McGraw-Hill, Inc., New York, NY, 1991. Type: Book (9780070686748)
Nov 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy