Abstract

Radio frequency identification (RFID) security is a relevant matter. The wide spread of RFID applications in the general society and the persistent attempts to safeguard it confirm it, especially since its use involves payments and the store or transmission of sensitive information. In this contribution, we present an innovative solution for improving the security of RFID passive tags through the use of a screen printed button, that allows the reception and transmission only when a certain level of physical pressure normal to its plane is applied. The materials and fabrication technology used demonstrate an easy to implement and cost-effective system, valuable in several scenarios where the user has straight contact with the tags and where its usage is direct and intentional.

Highlights

  • Radio frequency identification (RFID) tags or systems are increasingly used in day-to-day situations to provide information or handles to information stored elsewhere

  • We focus on the high frequency (HF) band (13.56 MHz) that can be implemented in many portable devices, such as smartphones, tables or dataphones [9]

  • We investigated the use of our thin pressure sensors without a dielectric as they are pressed at a certain pressure

Read more

Summary

Introduction

Radio frequency identification (RFID) tags or systems are increasingly used in day-to-day situations to provide information or handles to information stored elsewhere. This information stored within the tag can be sensitive; implying payments, access to restricted zones or privacy matters. Security concerns arise when not-authorized entities are able of tracking the location of tags or the person carrying it, eavesdropping on tag-to-reader communication, misuse of the information or identity theft through tag cloning [1]. In the case of users carrying RFID-tagged objects, the threat to people’s privacy relies in companies, governments and crooks, tracking people without their knowledge and consent; and potentially exploiting this private information. Criminals may fabricate fake products or duplicate identities to take advantage of its illegal use [2]. It would be desirable to add some extra control to the wireless data transfer, while maintaining it transparent to the user and not interfering in its utilization

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call