Abstract
This paper introduces shortly into the security and privacy issues of RFID systems and presents a simple approach to greatly enhance location privacy by changing traceable identifiers securely on every read attempt. The scheme gets by with only a single, unreliable message exchange. By employing one-way hash functions the scheme is safe from many security threats. It is intended for use in item identification but is useful in other applications as well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Black, J.: Playing Tag with Shoppers Anonymity, Business Week online (2003), available at http://www.businessweek.com/technology/content/jul2003/tc20030721_8408_tc073.htm
Garfinkel, S.: An RFID Bill of Rights, Technology Review, (2002), available at http://www.technologyreview.com/articles/garfinkel1002.asp
Crane, J.: Benetton Clothing to Carry Tiny Tracking Transmitters. Associated Press (2003)
RFID Journal: Gillette to Buy 500 Million EPC Tags, 2002; Michelin Embeds RFID Tags in Tires (2003), available at http://www.rfidjournal.com
Consumer Group Calls for Immediate Worldwide Boycott of Benetton, Website, available at http://www.boycottbenetton.org/PR_030313a.html
Website, http://www.stoprfid.org/
McCullagh, D.: RFID tags: Big Brother in small packages, CNET (2003), available at http://news.com.com/2010-1069-980325.html
Juels, A., et al.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security (2003)
Weis, S., et al.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: First International Conference on Security in Pervasive Computing, SPC (2003)
Weis, S.: Security and Privacy in Radio-Frequency Identification Devices, Massachusetts Institute of Technology (2003)
Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357. Springer, Heidelberg (2003)
Abadi, M., et al.: Authentication and Delegation with Smart-cards. Theoretical Aspects of Computer Software, pp. 326–345 (1991)
Weingart, S.: Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 302–317. Springer, Heidelberg (2000)
Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers. In: PerSec 2004 at IEEE PerCom (2004)
Sarma, S., et al.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–470. Springer, Heidelberg (2003)
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 24–88 (1981)
Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing, January-March 2003, pp. 46–55 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Henrici, D., Müller, P. (2004). Tackling Security and Privacy Issues in Radio Frequency Identification Devices. In: Ferscha, A., Mattern, F. (eds) Pervasive Computing. Pervasive 2004. Lecture Notes in Computer Science, vol 3001. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24646-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-24646-6_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21835-7
Online ISBN: 978-3-540-24646-6
eBook Packages: Springer Book Archive