NIST issues RFID guidelines on security

Agencies deploying radio frequency identification systems now have a set of security and privacy best practices to follow.

In a recent report, 'Guidelines for Securing Radio Frequency Identification Systems,' the National Institute of Standards and Technology recommended steps for mitigating security or privacy risks when deploying RFID.

The guidelines focus specifically on the use of RFID technologies for asset management, tracking, matching, and process and supply chain control.
Although RFID has the potential to improve logistics, reduce expenses and increase safety, it carries a risk of eavesdropping and unauthorized use, the NIST report states.

NIST prepared the report to meet requirements of the Federal Information Security Management Act of 2002 that it assist federal agencies in adequately securing their information technology systems.

Although intended primarily for a federal audience, the recommendations apply equally to the private sector, NIST said.

NIST's list of best practices includes installing firewalls between RFID databases and an organization's other IT systems, encrypting RFID signals, authenticating systems to identify approved users, shielding RFID tags to prevent eavesdropping, auditing procedures such as logging and time stamping to detect breaches, and disabling or destroying used tags to protect sensitive data.


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected