Publication date: 2008/9/8
Editor: Springer Science & Business Media
The deployment of the RFID technology can put the privacy of its users in jeopardy. With the aim of averting the fears of the RFID potential users, a plethora of security and privacy methods have been designed. However, due to the important growth of this technology, scalability problems have arisen and the proper deployment of the technology has become a challenge. In this chapter, we provide a brief overview of the most relevant methods for providing security and privacy to the users of the RFID technology. We pay a special attention to the hash locks proposal and we recall a method based on the distribution of RFID readers, with the aim to provide security and privacy in a scalable fashion. In order to test our method, we have developed a simulator that is presented in this chapter. By using this simulator we study the distribution of several kinds of readers on a variety of scenarios, and we report some of the obtained results.
Link to publication