scispace - formally typeset
Search or ask a question
Author

Daniel W. Engels

Bio: Daniel W. Engels is an academic researcher from Southern Methodist University. The author has contributed to research in topics: Radio-frequency identification & Authentication. The author has an hindex of 31, co-authored 110 publications receiving 5700 citations. Previous affiliations of Daniel W. Engels include Massachusetts Institute of Technology & AT&T.


Papers
More filters
Book ChapterDOI
TL;DR: Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.
Abstract: Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to every- day consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy of individuals or organizations. This paper presents a brief description of RFID systems and their operation. We describe privacy and security risks and how they apply to the unique setting of low-cost RFID devices. We propose several security mech- anisms and suggest areas for future research.

1,516 citations

Book ChapterDOI
13 Aug 2002
TL;DR: The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes with research opportunities for experts in cryptography and information security.
Abstract: The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes. We describe RFID technology, summarize our approach and our research, and most importantly, describe the research opportunities in RFID for experts in cryptography and information security. The common theme in low-cost RFID systems is that computation resources are very limited, and all aspects of the RFID system are connected to each other. Understanding these connections and the resulting design trade-offs is an important prerequisite to effectively answering the challenges of security and privacy in low-cost RFID systems.

668 citations

Proceedings ArticleDOI
06 Oct 2002
TL;DR: The reader collision problem, the problem of allocating frequencies over time to radio frequency identification (RFID) tag readers such that their interference with one another is minimized, is introduced and several graph coloring formulations for variants of the problem are presented.
Abstract: We introduce the reader collision problem, the problem of allocating frequencies over time to radio frequency identification (RFID) tag readers such that their interference with one another is minimized RFID systems are comprised of readers and tags Readers communicate with tags using radio frequency (RF) signaling to obtain the identifier and other data stored on the tag A reader may interfere with the operation of other readers in the RFID system The two principal types of reader-to-reader interference are frequency interference, two or more readers communicating on the same frequency at the same time, and tag interference, two or more readers attempting to communicate with a particular RFID tag at the same time All reader interference caused by the operation of an RFID reader is referred to as a reader collision Reader collisions prevent the colliding readers from communicating with all of the tags in their respective reading zones; therefore, collisions must be avoided to ensure proper and timely communication with all tags We define the reader collision problem and present several graph coloring formulations for variants of the problem

361 citations

Proceedings ArticleDOI
11 May 2003
TL;DR: The Colorwave algorithm as discussed by the authors is a simple, distributed, on-line algorithm for the reader collision problem in radio frequency identification (RFID) systems, which is used in supply chain management, which requires RFID readers to operate in close proximity to one another.
Abstract: We present the Colorwave algorithm, a simple, distributed, on-line algorithm for the reader collision problem in radio frequency identification (RFID) systems. RFID systems are increasingly being used in applications, such as those experienced in supply chain management, which require RFID readers to operate in close proximity to one another. Readers physically located near one another may interfere with one another's operation. Such reader collisions must be minimized to ensure the correct operation of the RFID system. The Colorwave algorithm yields on-line solutions that are near the optimal static solutions. The dynamic nature of the algorithm enables the RFID system to automatically adapt to changes in the system and in the operating environment of the system.

281 citations

Journal ArticleDOI
TL;DR: Remotely scannable IC chips that can access vast amounts of constantly updated information and cost only pennies could be close to reality.
Abstract: Remotely scannable IC chips that can access vast amounts of constantly updated information and cost only pennies could be close to reality. New technological developments and a decline in chip cost hold the promise of an automatic data and identification system that uses the Internet.

216 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Abstract: This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next several years-and eventually into the trillions. RFID tags track objects in supply chains, and are working their way into the pockets, belongings, and even the bodies of consumers. This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work. While geared toward the nonspecialist, the survey may also serve as a reference for specialist readers.

1,994 citations

Journal ArticleDOI
Roy Want1
TL;DR: The author introduces the principles of RFID, discusses its primary technologies and applications, and reviews the challenges organizations will face in deploying this technology.
Abstract: In recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables identification from a distance, and unlike earlier bar-code technology, it does so without requiring a line of sight. In this paper, the author introduces the principles of RFID, discusses its primary technologies and applications, and reviews the challenges organizations will face in deploying this technology.

1,681 citations

Book ChapterDOI
TL;DR: Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.
Abstract: Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to every- day consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy of individuals or organizations. This paper presents a brief description of RFID systems and their operation. We describe privacy and security risks and how they apply to the unique setting of low-cost RFID devices. We propose several security mech- anisms and suggest areas for future research.

1,516 citations

Journal ArticleDOI
TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues as a whole.
Abstract: Internet of Things (IoT) is playing a more and more important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, there come all kinds of challenges. This paper focuses on the security problems among all other challenges. As IoT is built on the basis of the Internet, security problems of the Internet will also show up in IoT. And as IoT contains three layers: perception layer, transportation layer and application layer, this paper will analyze the security problems of each layer separately and try to find new problems and solutions. This paper also analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues of IoT as a whole and tries to find solutions to them. In the end, this paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT.

1,060 citations

Proceedings ArticleDOI
27 Oct 2003
TL;DR: This work proposes the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing, and believes that this approach provides a very attractive alternative for addressing privacy concerns raised by the potential (and likely) widespread use ofRFID tags in consumer products.
Abstract: We propose the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing.While an ordinary RFID tag is a simple, cheap (e.g. five-cent) passive device intended as an "electronic bar-code" for use in supply-chain management, a blocker tag is a cheap passive RFID device that can simulate many ordinary RFID tags simultaneously. When carried by a consumer, a blocker tag thus "blocks" RFID readers. It can do so universally by simulating all possible RFID tags. Or a blocker tag can block selectively by simulating only selected subsets of ID codes, such as those by a particular manufacturer, or those in a designated "privacy zone.We believe that this approach, when used with appropriate care, provides a very attractive alternative for addressing privacy concerns raised by the potential (and likely) widespread use of RFID tags in consumer products.We also discuss possible abuses arising from blocker tags, and means for detecting and dealing with them.

925 citations