Abstract
We propose very simple and cheap but nevertheless effective protection against privacy threats for RFID-tags. For the hidden subset RFID-tags proposed in this paper, the ID string presented by an RFID-tag evolves rapidly. It is is not the bit value that enables one to recognize a tag. Instead, a reader detects some invariant properties that are hard to be recognized by a curious illegitimate reader.
The solution is not based on any cryptographic primitive, it relies only on properties of random sets and on linear mappings between vector spaces. The solution proposed is well suited for low-end devices, since all mechanisms can be easily implemented by circuits of a small size.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This work was partially supported by EU within the 7th Framework Programme under contract 215270 (FRONTS). It was initiated within the 6th Framework Programme under contract 001907 (DELIS). Marek Klonowski was beneficiary of domestic grant for young scientists awarded by The Foundation for Polish Science in the years 2006-2007.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ateniese, G., Camenisch, J., de Medeiros, B.: Untracable RFID Tags via Insubvertible Encryption. In: 12th ACM CCS 2005, pp. 92–101. ACM Press, New York (2005)
Blömer, J., Karp, R., Welzl, E.: The Rank of Sparse Random Matrices over Finite Fields. Random Structures and Algorithms 10(4), 407–419 (1997)
Cichoń, J., Klonowski, M., Kutyłowski, M.: Privacy Protection in Dynamic Systems Based on RFID Tags. In: 4th IEEE International Workshop on Pervasive Computing and Communication Security, Proceedings of PERCOM 2007 Workshops, pp. 235–240. IEEE Computer Society, Los Alamitos (2007)
Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal Re-encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)
Juels, A.: Yoking-Proofs for RFID Tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, p. 138. IEEE Computer Society Press, Los Alamitos (2004)
Juels, A.: RFID privacy: A Technical Primer for the Non-Technical Reader. In: Privacy and Technologies of Identity: A Cross-Disciplinary Conversation, Springer, Heidelberg (2005), available from: www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/rfid_privacy/DePaul23Feb05Draft.pdf
Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy 3(3), 34–43 (2005)
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM CCS 2003, pp. 103–111. ACM Press, New York (2003)
Molnar, D., Wagner, D.: Privacy and Security in Library RFID Issues, Practices and Architectures. In: 11th ACM CCS 2004, pp. 210–219. ACM Press, New York (2004)
Moskowitz, P.A., Lauris, A., Morris, S.S.: A Privacy Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag. In: PerTec 2007, Proceedings of PERCOM 2007 Workshops, pp. 348–351. IEEE Computer Society Press, Los Alamitos (2007)
Langheinrich, M.: A Survey of RFID Privacy Approaches. In: Workshop on Ubicomp Privacy - Technologies, Users, Policy. Workshop at Ubicomp 2007 (2007), available from: www.vs.inf.ethz.ch/publ/papers/langhein2007-ubipriv.pdf
Langheinrich, M.: RFID and Privacy. In: Security, Privacy, and Trust in Modern Data Management, Springer, Heidelberg (2007)
Rivest, R.L.: Chaffing and Winnowing: Confidentiality without Encryption, https://people.csail.mit.edu/rivest/chaffing.txt
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cichoń, J., Klonowski, M., Kutyłowski, M. (2008). Privacy Protection for RFID with Hidden Subset Identifiers. In: Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds) Pervasive Computing. Pervasive 2008. Lecture Notes in Computer Science, vol 5013. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79576-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-79576-6_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-79575-9
Online ISBN: 978-3-540-79576-6
eBook Packages: Computer ScienceComputer Science (R0)