Skip to main content

Tackling Security and Privacy Issues in Radio Frequency Identification Devices

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3001))

Abstract

This paper introduces shortly into the security and privacy issues of RFID systems and presents a simple approach to greatly enhance location privacy by changing traceable identifiers securely on every read attempt. The scheme gets by with only a single, unreliable message exchange. By employing one-way hash functions the scheme is safe from many security threats. It is intended for use in item identification but is useful in other applications as well.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Black, J.: Playing Tag with Shoppers Anonymity, Business Week online (2003), available at http://www.businessweek.com/technology/content/jul2003/tc20030721_8408_tc073.htm

  2. Garfinkel, S.: An RFID Bill of Rights, Technology Review, (2002), available at http://www.technologyreview.com/articles/garfinkel1002.asp

  3. Crane, J.: Benetton Clothing to Carry Tiny Tracking Transmitters. Associated Press (2003)

    Google Scholar 

  4. RFID Journal: Gillette to Buy 500 Million EPC Tags, 2002; Michelin Embeds RFID Tags in Tires (2003), available at http://www.rfidjournal.com

  5. Consumer Group Calls for Immediate Worldwide Boycott of Benetton, Website, available at http://www.boycottbenetton.org/PR_030313a.html

  6. Website, http://www.stoprfid.org/

  7. McCullagh, D.: RFID tags: Big Brother in small packages, CNET (2003), available at http://news.com.com/2010-1069-980325.html

  8. Juels, A., et al.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security (2003)

    Google Scholar 

  9. Weis, S., et al.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: First International Conference on Security in Pervasive Computing, SPC (2003)

    Google Scholar 

  10. Weis, S.: Security and Privacy in Radio-Frequency Identification Devices, Massachusetts Institute of Technology (2003)

    Google Scholar 

  11. Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Abadi, M., et al.: Authentication and Delegation with Smart-cards. Theoretical Aspects of Computer Software, pp. 326–345 (1991)

    Google Scholar 

  13. Weingart, S.: Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 302–317. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers. In: PerSec 2004 at IEEE PerCom (2004)

    Google Scholar 

  15. Sarma, S., et al.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–470. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 24–88 (1981)

    Article  Google Scholar 

  17. Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing, January-March 2003, pp. 46–55 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Henrici, D., Müller, P. (2004). Tackling Security and Privacy Issues in Radio Frequency Identification Devices. In: Ferscha, A., Mattern, F. (eds) Pervasive Computing. Pervasive 2004. Lecture Notes in Computer Science, vol 3001. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24646-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24646-6_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21835-7

  • Online ISBN: 978-3-540-24646-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics