Advertisement

Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

  • Melanie R. Rieback
  • Bruno Crispo
  • Andrew S. Tanenbaum
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4631)

Abstract

This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

Keywords

Access Control Access Control Policy Access Control Mechanism Electronic Product Code Access Control List 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    EPCglobal. 13.56 mhz ism band class 1 radio frequency (rf) identification tag interface specificationGoogle Scholar
  2. 2.
    Feldhofer, M.: An authentication protocol in a security layer for rfid smart tags. In: MELECON 2004. The 12th IEEE Mediterranean Electrotechnical Conference, vol. 2, pp. 759–762. IEEE Computer Society Press, Los Alamitos (2004)Google Scholar
  3. 3.
    Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for rfid systems using the aes algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)Google Scholar
  4. 4.
    Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley and Sons, Ltd, Chichester (2003)Google Scholar
  5. 5.
    Garfinkel, S.: An rfid bill of rights. Technology Review, p. 35 (October 2002)Google Scholar
  6. 6.
    Gaubatz, G., Kaps, J.-P., Ozturk, E., Sunar, B.: State of the art in public-key cryptography for wireless sensor networks. In: PerSec 2005. Proceedings of the Second IEEE International Workshop on Pervasive Computing and Communication Security, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  7. 7.
    Juels, A.: Minimalist cryptography for low-cost rfid tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, Springer, Heidelberg (2005)Google Scholar
  8. 8.
    Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: Selective blocking of rfid tags for consumer privacy. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, ACM Press, New York (2003)Google Scholar
  9. 9.
    Vajda, I., Buttyán, L.: Lightweight authentication protocols for low-cost rfid tags. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, Springer, Heidelberg (2003)Google Scholar
  10. 10.
    Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Melanie R. Rieback
    • 1
  • Bruno Crispo
    • 1
  • Andrew S. Tanenbaum
    • 1
  1. 1.Computer Systems Group, Vrije Universiteit, AmsterdamThe Netherlands

Personalised recommendations