NIST issues RFID guidelines on security

Agencies deploying radio frequency identification systems now have a set of security and privacy best practices to follow.

In a recent report, 'Guidelines for Securing Radio Frequency Identification Systems,' the National Institute of Standards and Technology recommended steps for mitigating security or privacy risks when deploying RFID.

The guidelines focus specifically on the use of RFID technologies for asset management, tracking, matching, and process and supply chain control.
Although RFID has the potential to improve logistics, reduce expenses and increase safety, it carries a risk of eavesdropping and unauthorized use, the NIST report states.

NIST prepared the report to meet requirements of the Federal Information Security Management Act of 2002 that it assist federal agencies in adequately securing their information technology systems.

Although intended primarily for a federal audience, the recommendations apply equally to the private sector, NIST said.

NIST's list of best practices includes installing firewalls between RFID databases and an organization's other IT systems, encrypting RFID signals, authenticating systems to identify approved users, shielding RFID tags to prevent eavesdropping, auditing procedures such as logging and time stamping to detect breaches, and disabling or destroying used tags to protect sensitive data.


  • business meeting (Monkey Business Images/

    Civic tech volunteers help states with legacy systems

    As COVID-19 exposed vulnerabilities in state and local government IT systems, the newly formed U.S. Digital Response stepped in to help. Its successes offer insight into existing barriers and the future of the civic tech movement.

  • data analytics (

    More visible data helps drive DOD decision-making

    CDOs in the Defense Department are opening up their data to take advantage of artificial intelligence and machine learning tools that help surface insights and improve decision-making.

Stay Connected