Artigo Acesso aberto Revisado por pares

The Security Implications of VeriChip Cloning

2006; Oxford University Press; Volume: 13; Issue: 6 Linguagem: Inglês

10.1197/jamia.m2143

ISSN

1527-974X

Autores

John Halamka, Ari Juels, Adam Stubblefield, Jonathan Westhues,

Tópico(s)

Advanced Authentication Protocols Security

Resumo

The VeriChip is a Radio-Frequency Identification (RFID) tag produced commercially for implantation in human beings. Its proposed uses include identification of medical patients, physical access control, contactless retail payment, and even the tracing of kidnapping victims. As the authors explain, the VeriChip is vulnerable to simple, over-the-air spoofing attacks. In particular, an attacker capable of scanning a VeriChip, eavesdropping on its signal, or simply learning its serial number can create a spoof device whose radio appearance is indistinguishable from the original. We explore the practical implications of this security vulnerability. The authors argue that:1 The VeriChip should serve exclusively for identification, and not authentication or access control. 2 Paradoxically, for bearer safety, a VeriChip should be easy to spoof; an attacker then has less incentive to coerce victims or extract VeriChips from victims' bodies.

Referência(s)