Wednesday, May 2, 2007

NIST issues RFID security guidelines

The National Institute of Standards and Technology (NIST) has issued guidelines for RFID. NIST's report on RFID security was released last week as it urges everyone using the technology to evaluate security and privacy risks and use best practices to mitigate them. The institute said it released the report to meet some of its responsibilities under the Federal Information and Security Management Act of 2002, which requires federal agencies to secure information technology systems.

NIST also said the report is likely to benefit other types of organizations as well.

"The goal of our report is to give organizations practical ways in a structured format with checklists and specific recommendations to address potential RFID security risks," said NIST's Tom Karygiannis in a statement.

The document focuses on asset management, tracking, matching and supply chain uses. It recommends the use of firewalls to separate RFID databases from other IT systems and databases. NIST also urges users to encrypt radio signals, authenticate approved users, and block tag signals with metal shields to prevent unauthorized skimming of information. The report states that auditing, logging, and time-stamping should be used to detect security breaches and it urges users to establish tag disposal and recycling procedures for disabling the devices and destroying data.

"RFID tags, commonly referred to as smart tags, have the ability to improve logistics, profoundly change cost structures for business, and improve the current levels of safety and authenticity of the international pharmaceutical supply chain and many other industries," Undersecretary of Commerce for Technology Robert C. Cresanti said in a prepared statement. "This important report lays the foundation for addressing potential RFID security risks so that a thoughtful enterprise can launch a smart tag program with confidence."

The 115-page report covers several aspects of RFID technology, including applications, requirements, middleware, networks, economics, environment and durability.

Source : EE-Times

No comments: