RFID implants: Opportunities and challenges for identifying people

被引:22
作者
Rotter, Pawel
Daskala, Barbara
Compano, Ramon
机构
[1] Institute for Prospective Technological Studies (IPTS), Automatics Department, AGH-University of Science and Technology, Kraków
关键词
D O I
10.1109/MTS.2008.924862
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification (RFID) implants of today are mainly about passive implants. Such devices are already commercialized and are specifically designed to facilitate the identification and authentication (I and A) process. The first RFID implant was the VeriChip, which stores an identification number only, and can be read from a distance of about 10cm with a handheld reader and 50cm with a door reader. Since it is a passive tag, the implants do not need batteries to operate but make use of the energy emitted by an external RFID reader. However, the lack of internal power source and small size limits the devices' performance in terms of memory, processing power, and communication range. The advantage of using them include more convenient identification and can be used by everyone. On the other hand, there are concerns about their use, like privacy risks, unauthorized replication of information, health issues especially that relates to cancer as well as the fact that it has low social acceptance.
引用
收藏
页码:24 / 32
页数:9
相关论文
共 26 条
[11]  
KENT J, 2005, BBC NEWS 0331
[12]  
*KEV WARW WEBP, WHAT HAPP MAN IS MER
[13]   Picking virtual pockets using relay attacks on contactless smartcard systems [J].
Kfir, Z ;
Wool, A .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :47-58
[14]   End of life impacts of pervasive computing [J].
Kräuchi, PH ;
Wäger, PA ;
Eugster, M ;
Grossmann, G ;
Hilty, L .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) :45-53
[15]  
LEWAN T, 2007, ASS PRESS 0908
[16]  
MAGHIROS I, 2007, 22770 EUR IPTS EN
[17]  
MARBURGER A, IMPLANTABLE RFID HLT
[18]  
NATH B, 2006, PERVASIVE COMPUTING, V5
[19]  
*NIST, 1995, US DEP COMM SPEC PUB
[20]   Social acceptance of RFID as a biometric security method [J].
Perakslis, Christine ;
Wolk, Robert .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2006, 25 (03) :34-42