ABSTRACT

This chapter aims to try to solve problems with respect to privacy and personal information protection in radio frequency identification device (RFID) systems with the help of technology. It describes privacy protection from personal information protection. In the literature, information systems, including RFID systems, do not directly manage privacy protection. They manage personal information protection. The chapter discusses personal information protection in RFID systems, and considers the two issues as properties of an RFID system: anonymity and unlinkability. It examines personal information protection schemes in RFID systems. The three protection schemes are: physical blocking approach, rewritable tag approach, and smart tag approach. The physical blocking approach satisfies anonymity and unlinkability by preventing an adversary from accessing RFID tags physically. The physical blocking approach has a problem: a user cannot use the RFID services because even a regular service reader cannot access the RFID tags. The chapter explores hash-based schemes, which are some of the smart tag approaches.