Researchers Receive Grant To Improve RFID Security

The National Science Foundation has awarded a team of University of Virginia engineers $1 million to improve the privacy and security of RFID chips, computer chips the size of a grain of sand that wirelessly send and receive information over short distances (generally 10 feet or less) via very low-power radio waves.

One common RFID use: the remote car-locking systems that dangle from millions of keychains all over the world.

Billions of RFID chips are already in use in a variety of applications, explained the research team's leader, David Evans, an associate professor of computer science in U.Va.'s School of Engineering and Applied Science.

Many are used to effectively replace the ubiquitous bar codes that currently identify all our products. Wireless readers of the RFIDs eliminate the need for manually scanning barcodes, providing great advantages for inventory management. Major users include Wal-Mart and the U.S. military.

RFID chips are also increasingly being used in more sophisticated applications. The chips provide the wireless magic behind touchless smart cards being used for more and more things, from touchless credit and debit cards, to building access keycards and reusable farecards for public transit systems. RFID is also being used in wearable and implantable medical devices, to transmit patient data for remote monitoring, said fellow researcher John Lach, an associate professor of electrical and computer engineering who has done pioneering research in the field

Use of RFIDs for patient monitoring is a trend expected to increase in the future, Lach said, as Baby Boomers age and the rising costs of health care prompt a new emphasis on "aging in place" -- allowing the elderly to remain independent while also having their health effectively monitored.

The wireless nature of RFIDs gives them myriad potential uses, but also raises security and privacy concerns. For instance, many already-implanted medical RFIDs have no security measures, Lach noted, prompting a recent outcry that an unprotected pacemaker or insulin delivery system could be tampered with externally.

More expensive RFID chips (costing more than 50 cents apiece) have enough resources (memory space and power) to allow standard encryption schemes that provide good security.

But less expensive and lower powered chips -- the ones that are and will be used most widely -- do not have the capacity to allow standard encryption schemes. Such chips either include no security measures or use custom cryptography, which has repeatedly proven to be a weak defense.

To address the problematic use of custom cryptography, the U.Va. research team will develop an encryption scheme that is relatively strong -- providing some measure of privacy and security -- but that can be implemented at almost zero cost by repurposing the meager hardware resources already available on common RFID tags. Providing a solution that adds virtually no cost is crucial, because these RFIDs are made by the billions, at such low costs (5 cents or less apiece) that there is no margin for any added expense.

"The ultimate goal is to make the cost as close to zero as possible," Evans said.

The new design will be published, allowing rapid and inexpensive adoption by RFID makers.

"At least from a cost side, there will no longer be an excuse not to have security and privacy," said Nohl, whose 2008 doctoral thesis on RFID security is providing a foundation for some of the newly funded research.

The team is breaking new ground by using a holistic design approach that considers how all the various levels of the design -- the hardware, the encryption algorithm and how it is used -- work together, mindful of how an attacker will target the single weakest link in the design.

"This is really the justification for breaking systems," Evans said. "By using a big-picture approach to zero in on the most vulnerable aspects of the system, you learn how to design better systems."

The other members of the research team are Ben Calhoun, an assistant professor in electrical and computer engineering and an expert in low-power circuit design, and Abhi Shelat, an assistant professor of computer science specializing in cryptography.

RFIDs are poised to offer many cool functions and capabilities in the future. For instance, a refrigerator could read the RFIDs that identify the foods within it, and then offer a recipe suggestion to make use of what's on hand, Nohl said.

But RFID capabilities are already raising serious privacy and security concerns among consumers and the public. If the information on an RFID is not encrypted (or poorly encrypted), it can be read by anyone with an inexpensive RFID reader device.

In an activity called "skimming," a thief can simply walk by you or hang out in a crowded location and potentially steal monetary value from your smartcard, or copy your keycard for building access.

Consumer profilers could take a digital snapshot of everything in your shopping cart or backpack, possibly using it to target advertising or enable price discrimination, and could track your movements by reading the tags on the items you carry.

To avoid such pitfalls, proposed legislation in Europe would require that all RFIDs are disabled at any point of retail sale.

"It would be sad if, as a result of the discussion around RFID privacy, the decision is made to just disable them all," Nohl said. This would eliminate many potential benefits of RFIDs, and would not solve the privacy and security problems for applications like library books, subway farecards and medical devices, where the RFID needs to keep working.

The research team hopes their research will forestall that possibility, enabling RFIDs to be used in countless ingenious applications not yet dreamt of, without sacrificing privacy and security in a Faustian bargain.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”