RFID Security and Human Microchipping Privacy and Concerns

Authors

  • Mohammed Ababtain Saudi Aramco
  • Mariam Bbshait
  • Nada Alnoaimi None

Keywords:

RFID, RFID tag, RFID reader, Cloning, Spoofing, Eavesdropping, Authentication, Adversary, RFID security, RFID privacy, Human Microchipping, Denial of service attacks, Replay attacks, PUF, Physical Unclonable Function, RFID Guardian, Mandatory access control (MAC), Discretionary access control (DAC), Social Engineering, Antenna, Identification chip, Implantation

Abstract

Radio Frequency Identification (RFID) technology is used to identify items remotely. The RFID system consists of three main parts: an RFID tag, which contains data about an item; an RFID reader; and an antenna that transmits radio signals between the tag and the reader. This system has many applications to identify and track objects and people — human microchipping. Therefore, besides the security threats associated with RFID systems, when technology is related to people, privacy will be at more risk. In this paper, some RFID security and privacy concerns will be addressed, along with corresponding countermeasures. Human microchipping will be discussed along with available legislation in the United States.

Author Biographies

Mohammed Ababtain, Saudi Aramco

Mohammed Ababtain has 8 years of experience as a cybersecurity specialist working in the Department of Information Protection, Saudi Aramco, Saudi Arabia. He received his Bachelor degree in Software Engineering from King Fahad University of Petroleum & Minerals, Saudi Arabia, and a Master of Science in Cybersecurity Engineering from University of Southern California, USA. His areas of interest are penetrating testing, vulnerability management and applications security.

Mariam Bbshait

Mariam Bubshait is working as a cybersecurity specialist in the Department of Information Protection, Saudi Aramco, Saudi Arabia. She received her Bachelor degree in Computer Science from Imam Abdulrahman Bin Faisal University (IAU), Saudi Arabia, and a Master of Science in Cyber Security Engineering from University of Southern California (USC), USA. She holds many professional certifications such as CISSP, GWEB, GPEN and CEH. She is a professional member of ISSA, Los Angeles. Her areas of specialty are applications security, mobile security and vulnerability management.

References

A. Mitrokotsa, M. R. Rieback and A. S. Tanenbaum, "Classifying RFID attacks and defenses," Inf Sys Front, vol. 12, pp. 491-505, 2009.

Angelo Friggieri, K. Michael and M. Michael, "The Legal Ramifications of Microchipping People in the United States of America- a State Legislative Comparison," IEEE, 2009.

A. Juels, "RFID Security and Privacy: A Research Survey," IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, vol. 24, no. 2, pp. 381-394, 2006.

Bill Number SB 362 for Identification devices: subcutaneous implanting, 2007.

D. Ahsanullah, N. Shams and D. Saifullah, "East West University, Bangladesh Anticipating Ethical Challenges of RFID," in the International Conference on Computer and Communication Engineering, Kuala Lumpur, 2008.

K. R. Foster and J. Jaeger, "RFID Inside; The murky ethics of implanted chips," IEEE Spectrum, pp. 24-29, 2007.

M. Katina and M. M G, "Microchipping people: the rise of the electrophorus," Quadrant, vol. 3, no. 49, pp. 22-33, 2005.

Downloads

Published

2022-09-01

How to Cite

Ababtain, M., Bbshait, M. ., & Alnoaimi, N. (2022). RFID Security and Human Microchipping Privacy and Concerns . International Journal of Machine Learning and Networked Collaborative Engineering, 5(`1), 1–7. Retrieved from http://mlnce.net/index.php/Home/article/view/182