Nothing Special   »   [go: up one dir, main page]

Skip to main content

Abstract

Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Avoine Gildas: Adversary Model for Radio Frequency Identification. In: LASEC Technical Report, 2005-001, Swiss Federal Institute of Technology (EPFL). 2005, 14 pages.

    Google Scholar 

  • Brands Stefan, Chaum David: Distance-Bounding Protocols. In: Advances in Cryptology – EURO-CRYPT 1993, Lecture Notes in Computer Science, LNCS 765, Springer-Verlag. 1994, p. 344-359.

    Google Scholar 

  • Dimitriou Tassos: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, IEEE Computer Society. 2005, p. 59-66.

    Google Scholar 

  • Engberg Stephan, Harning Morten Borup, Jensen Christian Damsgaard: Zero-knowledge Device Authentication: Privacy and Security Enhanced RFID Preserving Business Value and Consumer Convenience. In: Proceedings of the Second Annual Conference on Privacy, Security and Trust. 2004, p. 89-101.

    Google Scholar 

  • EPC global: Class 1 Generation 2 UHF Air Interface Protocol Standard version 1.2.0. In: http://www.epcglobalinc.org/home. 2008, 108 pages.

  • Frumkin Dmitry, Shamir Adi. Untrusted-HB: Security Vulnerabilities of Trusted-HB. In: Proceedings of the 5th Workshop on RFID Security. 2009, p. 62-71.

    Google Scholar 

  • Hancke G.P, Kuhn M.G.: An RFID Distance Bounding Protocol. In: Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, IEEE Computer Society. 2005, p. 67-73.

    Google Scholar 

  • Henrici Dirk, Müller Paul: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE International Conference on Pervasive Computing and Communications Workshops, IEEE Computer Society. 2004, p. 149-153.

    Google Scholar 

  • IBM: IBM Licenses Clipped Tag RFID Technology to Marnlen RFiD. In: http://www-03.ibm.com/press/us/en/pressrelease/20592.wss. 2006.

  • Juels Ari, Rivest Ronald, Szydlo Michael: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, ACM. 2003, p. 103-111.

    Google Scholar 

  • Juels Ari, Syverson Paul, Bailey Daniel: High-Power Proxies for Enhancing RFID Privacy and Utility. In: Proceedings of the 5th International Workshop on Privacy Enhancing Technologies, Lecture Notes in Computer Science, LNCS 3856, Springer-Verlag. 2005, p. 210-226.

    Google Scholar 

  • Juels Ari, Weis Stephen: Authenticating pervasive devices with human protocols. In: Advances in Cryptology – CRYPTO 2005, Lecture Notes in Computer Science, LNCS 3621, Springer-Verlag. 2005, p. 293-308.

    Google Scholar 

  • Juels Ari, Weis Stephen: Defining Strong Privacy for RFID. In: Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops, IEEE Computer Society 2007, p. 342-347.

    Google Scholar 

  • Karjoth Günther, Moskowitz Paul: Disabling RFID tags with visible confirmation: clipped tags are silenced. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, ACM. 2005, p. 27-30.

    Google Scholar 

  • Molnar David, Soppera Andrea, Wagner David: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Proceedings of the 12th International Workshop on Selected Areas in Cryptography, Lecture Notes in Computer Science, LNCS 3897, Springer-Verlag. 2005, p. 276-290.

    Google Scholar 

  • Molnar David, Wagner David: Privacy and security in library RFID: Issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, ACM. 2004, p. 210-219.

    Google Scholar 

  • Rieback M., Crispo B., Tanenbaum A.: RFID Guardian: A batterypowered mobile device for RFID privacy management. In: Proceedings of the 10th Australasian Conference on Information Security and Privacy, Lecture Notes in Computer Science, LNCS 3574, Springer-Verlag. 2005, p. 184-194.

    Google Scholar 

  • Sadeghi A-R., Visconti I., WachtsmannC: Efficient RFID Security and Privacy with Anonymizers. In: Proceedings of the 5th Workshop on RFID Security. 2009, p. 153-172.

    Google Scholar 

  • Singelée Dave, Preneel Bart: Distance Bounding in Noisy Environments. In: Proceedings of the 4th European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, Lecture Notes in Computer Science, LNCS 4572, Springer-Verlag. 2007, p. 101-115.

    Google Scholar 

  • Song Boyeon, Mitchell Chris J.: RFID authentication protocol for low-cost tags. In: Proceedings of the 1 st ACM Conference on Wireless Network Security, ACM. 2008, p. 140-147.

    Google Scholar 

  • Spiekermann Sarah, Evdokimov Sergei: Critical RFID Privacy-Enhancing Technologies. In: IEEE Security and Privacy, Vol. 7, no. 2, IEEE Computer Society. 2009, p. 56-62.

    Article  Google Scholar 

  • Tsudik Gene: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications Workshops, IEEE Computer Society. 2006, p. 640-643.

    Google Scholar 

  • Vaudenay Serge: On Privacy Models for RFID. In: Advances in Cryptology – ASIACRYPT 2007, Lecture Notes in Computer Science, LNCS 4833, Springer-Verlag. 2007, p. 68-87.

    Google Scholar 

  • Weis S., Sarma S., Rivest S., Engels D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing, Lecture Notes in Computer Science, LNCS 2802, Springer-Verlag. 2003, p. 454-469.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Vieweg+Teubner | GWV Fachverlage GmbH

About this chapter

Cite this chapter

Singelée, D., Seys, S. (2010). User Privacy in RFID Networks. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9363-5_20

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0958-2

  • Online ISBN: 978-3-8348-9363-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics