Skip to Main Content
Blocker tags have been designed to enhance the privacy that users of RFID tags wish to preserve. To realize when and how well the new protective instruments perform, this investigation conducts simulation experiments to address two research problems. One finding reveals that blocker tags offer different levels of protection to tags associated with different leaf nodes in the binary tree. Besides, another finding confirms the potential of a new attack in which an attacker could exclusively read tag data while preventing the data requests from legal readers. Both analysis results suggest that high-risk items be placed in the right half of the tree.