The security of information between Radio Frequency Identification (RFID) tags and readers is only now being strengthened to meet commercial needs with Gen 2 tags. Tags that present surmountable barriers for compromise represent a potential supply chain disruption opportunity. In the extreme, such disruptions might include the purposeful re-programming of tags to reflect errant weight, quantity or size information.
TECHNOLOGY AND ADAPATABILITY
Technology has proven to be reliable, especially in supply chains, and is already showing tremendous benefits. But an automated supply chain mandates the necessity for data privacy, identity and non-refutability, and organizations should ensure the RFID technology they adopt supports their security requirements. Companies need to be aware of the security risks, such as profiling, eavesdropping, denial of service attacks and inventory jamming.
RFID & PRIVACY CONCERNS
Radio Frequency Identification (RFID) tags, which are microchips fitted with antennas. An RFID reader can radio a query to the tag, causing it to return the data it contains–in this case, an identification number that lets customs agents retrieve information about the cardholder from a government database. The idea is that instant access to biographical data, a photo, and the results of terrorist and criminal background checks will help agents move people through the border efficiently. RFID technology, however, has been raising privacy concerns since it was introduced.
With multiple standards and developers seeking to gain the upper hand through their own intellectual property, many businesses are adopting the technology before it is fully ripened, which includes any unresolved issues surrounding security.