The security implications of VeriChip cloning
- PMID: 16929037
- PMCID: PMC1656959
- DOI: 10.1197/jamia.M2143
The security implications of VeriChip cloning
Abstract
The VeriChip is a Radio-Frequency Identification (RFID) tag produced commercially for implantation in human beings. Its proposed uses include identification of medical patients, physical access control, contactless retail payment, and even the tracing of kidnapping victims. As the authors explain, the VeriChip is vulnerable to simple, over-the-air spoofing attacks. In particular, an attacker capable of scanning a VeriChip, eavesdropping on its signal, or simply learning its serial number can create a spoof device whose radio appearance is indistinguishable from the original. We explore the practical implications of this security vulnerability. The authors argue that:1 The VeriChip should serve exclusively for identification, and not authentication or access control. 2 Paradoxically, for bearer safety, a VeriChip should be easy to spoof; an attacker then has less incentive to coerce victims or extract VeriChips from victims' bodies.
Comment in
-
Re: "A security analysis of the Verichip implantable RFID device" JAMIA PrePrint: accepted article. Published August 23, 2006 as doi:10.1197/jamia.M2143.J Am Med Inform Assoc. 2007 Mar-Apr;14(2):249-50; author reply 251. doi: 10.1197/jamia.M2316. Epub 2007 Jan 9. J Am Med Inform Assoc. 2007. PMID: 17213488 Free PMC article. No abstract available.
Similar articles
-
Re: "A security analysis of the Verichip implantable RFID device" JAMIA PrePrint: accepted article. Published August 23, 2006 as doi:10.1197/jamia.M2143.J Am Med Inform Assoc. 2007 Mar-Apr;14(2):249-50; author reply 251. doi: 10.1197/jamia.M2316. Epub 2007 Jan 9. J Am Med Inform Assoc. 2007. PMID: 17213488 Free PMC article. No abstract available.
-
Ethical implications of implantable radiofrequency identification (RFID) tags in humans.Am J Bioeth. 2008 Aug;8(8):44-8. doi: 10.1080/15265160802317966. Am J Bioeth. 2008. PMID: 18802863
-
Radio-frequency identification: its potential in healthcare.Health Devices. 2005 May;34(5):149-60. Health Devices. 2005. PMID: 16048121 Review.
-
Versatile PDAs pick up RFID, bar codes.Health Data Manag. 2005 Dec;13(12):56, 58. Health Data Manag. 2005. PMID: 16381495 No abstract available.
-
Comparison and Feasibility of Various RFID Authentication Methods Using ECC.Sensors (Basel). 2018 Sep 1;18(9):2902. doi: 10.3390/s18092902. Sensors (Basel). 2018. PMID: 30200493 Free PMC article. Review.
Cited by
-
Safety and reliability of Radio Frequency Identification Devices in Magnetic Resonance Imaging and Computed Tomography.Patient Saf Surg. 2010 Feb 2;4(1):2. doi: 10.1186/1754-9493-4-2. Patient Saf Surg. 2010. PMID: 20205829 Free PMC article.
-
Clone tag detection in distributed RFID systems.PLoS One. 2018 Mar 22;13(3):e0193951. doi: 10.1371/journal.pone.0193951. eCollection 2018. PLoS One. 2018. PMID: 29565982 Free PMC article.
-
Implantable QR code subcutaneous microchip using photoacoustic and ultrasound microscopy for secure and convenient individual identification and authentication.Photoacoustics. 2023 May 9;31:100504. doi: 10.1016/j.pacs.2023.100504. eCollection 2023 Jun. Photoacoustics. 2023. PMID: 37214429 Free PMC article.
-
Clinical Study of Using Biometrics to Identify Patient and Procedure.Front Oncol. 2020 Dec 1;10:586232. doi: 10.3389/fonc.2020.586232. eCollection 2020. Front Oncol. 2020. PMID: 33335855 Free PMC article.
-
The Value of Radio Frequency Identification in Quality Management of the Blood Transfusion Chain in an Academic Hospital Setting.JMIR Med Inform. 2019 Aug 5;7(3):e9510. doi: 10.2196/medinform.9510. JMIR Med Inform. 2019. PMID: 31381503 Free PMC article.
References
-
- Second meeting of the American Health Information Community, 29 November 2005. Available at: http://www.hhs.gov/healthit/m20051129.html.
-
- Albrecht K, McIntyre L. The Spychips Threat: Why Christians Should Resist RFID and Computer Tracking. Nelson Current; 2006.
-
- Bahney A. High tech, under the skin New York Times 2006. 2 February. Available at: http://www.nytimes.com/2006/02/02/fashion/thursdaystyles/02tags.html. Accessed February 2, 2006.
-
- Bono S, Green M, Stubblefield A, Juels A, Rubin A, Szydlo M. Security analysis of a cryptographically-enabled rfid device 14th USENIX Security Symposium. 2005. pp. 1-16Baltimore, Maryland, USA, July-August. USENIX Videos and other information available at www.rfidanalysis.org .
-
- VeriChip Corporation Procedure for VeriMedTM system use. 2006. Available at: www.verimedinfo.com/files/VeriMed%20ER%20Protocol.pdf .
MeSH terms
LinkOut - more resources
Full Text Sources
Other Literature Sources
Research Materials