@InProceedings{JRS03, author = { Ari Juels and Ronald L. Rivest and Michael Szydlo }, title = { The {Blocker Tag}: Selective blocking of {RFID} Tags for Consumer Privacy }, pages = { 103--111 }, doi = { 10.1145/948109.948126 }, acm = { 784297 }, booktitle = { Proceedings Tenth ACM Conference on Computer and Communications Security }, publisher = { ACM }, isbn = { 1-58113-738-9 }, editor = { Vijay Atluri and Trent Jaeger }, date = { 2003-10 }, OPTyear = { 2003 }, OPTmonth = { October 27--30 }, eventtitle = { CCS'03 }, evenetdate = { 2003-10-27/2003-10-30 }, venue = { Washington, DC }, urla = { RSA page }, keywords = { barcodes, privacy, RFID tags, tree walking }, abstract = { We propose the use of ``selective blocking'' by ``blocker tags'' as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing. \par While an ordinary RFID tag is a simple, cheap (e.g. five-cent) passive device intended as an ``electronic bar-code'' for use in supply-chain management, a blocker tag is a cheap passive RFID device that can simulate many ordinary RFID tags simultaneously. When carried by a consumer, a blocker tag thus ``blocks'' RFID readers. It can do so universally by simulating all possible RFID tags. Or a blocker tag can block selectively by simulating only selected subsets of ID codes, such as those by a particular manufacturer, or those in a designated ``privacy zone.'' \par We believe that this approach, when used with appropriate care, provides a very attractive alternative for addressing privacy concerns raised by the potential (and likely) widespread use of RFID tags in consumer products. We also discuss possible abuses arising from blocker tags, and means for detecting and dealing with them. }, }