This Article 
 Bibliographic References 
 Add to: 
OpenTag: Privacy Protection for RFID
April-June 2009 (vol. 8 no. 2)
pp. 71-77
Henry Holtzman, MIT Media Laboratory
Sanghoon Lee, Oracle
Daniel Shen, Stanford University
Radio frequency identification (RFID) is widely used to identify goods in the supply chain and is increasingly implemented in individual manufactured goods at the retail level. This is a positive trend for pervasive computing; ubiquitous, machine-readable tagging of objects has proven valuable—yet elusive—in the past. With the proliferation of RFID tagged objects, however, comes the possibility of privacy loss. OpenTag was designed to prototype new privacy enhancing algorithms for RFID. Its tags are programmable and work in several modes, including EPC mode, where they're fully compatible with EPCglobal's dominant supply-chain RFID standard. OpenTags can also operate in private mode, frequently altering their IDs so that only authorized readers can predict them, as well as in invisible mode, where they stop responding to readers entirely. Designed for cradle-to-grave object tagging, OpenTags easily and appropriately transition between their various modes.

1. S. Garfinkel and H. Holtzman, "Understanding RFID Technology," RFID—Applications, Security, and Privacy, S. Garfinkel, and B. Rosenburg eds., Addison-Wesley, 2005, pp 15–36.
2. D. Wan, "Magic Medicine Cabinet: A Situated Portal for Consumer Healthcare," , Proc. 1st Int'l Symp. Handheld and Ubiquitous Computing (HUC '99), LNCS 1707, Springer Verlag, 1999, pp. 352-355.
3. J. Scanlon, "The Thing Network," Wired Magazine, vol. 8, no. 2, Feb. 2000, p. 76.
4. K. Albrecht and L. McIntyre, Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID, Thomas Nelson, 2005.
5. Draft Protocol Specification for a 900MHz Class 0 Radio Frequency Identification Tag, Massachusetts Institute of Technology Auto-ID Center, 23 February 2003;
6. UHF TagModem Instructions v. 1.1., TagSense, 2005; UHF-DL-v1.pdf.
7. D.Z. Shen, OpenTag—Privacy Control Methods in RFID, master's thesis, Massachusetts Institute of Technology, Dept. Electrical Engineering and Computer Science, 2006.
8. 8-bit AVR Microcontroller with 8K Bytes In-System Programmable Flash ATmega48/V, ATmega88/V and ATmega168/V, Revision 2545F-AVR-06/05, Atmel, 2005; doc2545.pdf.
9. A. Juels, R.L. Rivest, and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy," Proc. 8th ACM Conf. Comp. and Comm. Security, ACM Press, 2003, pp. 103–111.
10. M. Ohkubo, K. Suzuki, and S. Kinoshita, "A Cryptographic Approach to 'Privacy Friendly' Tags," RFID Privacy Workshop MIT, Cambridge, MA, November 2003; ohkubo.pdf.
11. S. Kinoshita et al., "Privacy Enhanced Active RFID Tag," Proc. 1st Int'l Workshop on Exploiting Context Histories in Smart Environment, Fraunhofer Institute, 2005.
12. S.E. Sarma, S.A. Weis, and D.W. Engels, "Radio-Frequency Identification: Secure Risks and Challenges," RSA Laboratories Cryptobytes, vol. 6, no. 1, 2003, pp. 2–9.
13. J.R. Smith et al., "A Wirelessly Powered Platform for Sensing and Computation," Proc. 8th Int'l Conf. Ubiquitous Computing, Springer Verlag, 2006, pp. 495–506.
14. N. Cho et al., "A 5.1-μW UHF RFID Tag Chip Integrated with Sensors for Wireless Environmental Monitoring," Proc. 31st European Solid-State Circuits Conf., IEEE CS Press, 2005, pp. 279–282.

Index Terms:
privacy, security, RFID
Henry Holtzman, Sanghoon Lee, Daniel Shen, "OpenTag: Privacy Protection for RFID," IEEE Pervasive Computing, vol. 8, no. 2, pp. 71-77, April-June 2009, doi:10.1109/MPRV.2009.33
Usage of this product signifies your acceptance of the Terms of Use.