Skip to main content

Scanning with a Purpose – Supporting the Fair Information Principles in RFID Protocols

  • Conference paper
Ubiquitous Computing Systems (UCS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3598))

Included in the following conference series:

Abstract

Today’s RFID protocols that govern the communication between RFID readers and tags are solely optimized for performance, but fail to address consumer privacy concerns by appropriately supporting the fair information practices. In this paper we propose a feature set that future privacy-aware RFID protocols should include in order to support the fair information principles at the lowest possible level – the air interface between readers and tags – and demonstrate that the performance impact of such an extension would be within acceptable limits. We also outline how this feature set would allow consumer interest groups and privacy-concerned individuals to judge whether an RFID reader deployment complies with the corresponding regulations through the use of a watchdog tag.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Resolution on Radio Frequency Identification. In: 25th International Conference of Data Protection and Privacy Commissioners (November 2003)

    Google Scholar 

  2. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Implementing P3P Using Database Technology. In: Proceedings of the IEEE 19th International Conference on Data Engineering, Bangalor, India, March 2003, pp. 595–606. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  3. Auto-ID Center. Draft protocol specification for a 900 MHz Class 0 Radio Frequency Identification Tag (2003)

    Google Scholar 

  4. Cranor, L., Langheinrich, M., Marchiori, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Candidate Recommendation (December 2000)

    Google Scholar 

  5. EPCglobal. EPC Tag Data Specification 1.1 (November 2003)

    Google Scholar 

  6. European Commission. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (November 1995)

    Google Scholar 

  7. Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, Ltd., Chichester (2003)

    Google Scholar 

  8. Garfinkel, S.L.: Adopting Fair Information Practices in Low-Cost RFID Systems. In: Privacy Workshop at the International Conference on Ubiquitous Computing 2002 (Ubicomp 2002) (September 2002)

    Google Scholar 

  9. Gershman, A., Fano, A.: A wireless world: The Internet sheds its chains

    Google Scholar 

  10. International Organization for Standardization. ISO/IEC 18000: Information technology automatic identification and data capture techniques - Radio frequency identification for item management air interface (2003)

    Google Scholar 

  11. Juels, A., Rivest, R.L.: The blocker tag: Selective blocking of RFID tags for consumer privacy. In: 10th Annual ACM CCS 2003 (May 2003)

    Google Scholar 

  12. Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Mealling, M.: Auto-ID Object Name Service (ONS) 1.0 (2003)

    Google Scholar 

  14. Organisation for Economic Co-operation and Development (OECD). Recommendation of the Council Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data (September 1980)

    Google Scholar 

  15. Privacy Rights Clearinghouse. Position statement on the use of RFID on consumer products

    Google Scholar 

  16. Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002, vol. 2523, pp. 454–470. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Stajano, F.: Security for ubiquitous computing. John Wiley & Sons, Ltd., Chichester (2002)

    Book  Google Scholar 

  18. Wan, D.: Magic medicine cabinet: A situated portal for consumer healthcare. In: Gellersen, H.-W. (ed.) HUC 1999, vol. 1707, pp. 352–355. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  19. Weiser, M., Gold, R., Brown, J.: The origins of ubiquitous computing research at PARC in the late 1980s. IBM Systems Journal, 693–696 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Floerkemeier, C., Schneider, R., Langheinrich, M. (2005). Scanning with a Purpose – Supporting the Fair Information Principles in RFID Protocols. In: Murakami, H., Nakashima, H., Tokuda, H., Yasumura, M. (eds) Ubiquitous Computing Systems. UCS 2004. Lecture Notes in Computer Science, vol 3598. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11526858_17

Download citation

  • DOI: https://doi.org/10.1007/11526858_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27893-1

  • Online ISBN: 978-3-540-31809-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics