Skip to main content

His Late Master’s Voice: Barking for Location Privacy

  • Conference paper
Security Protocols XIX (Security Protocols 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7114))

Included in the following conference series:

  • 692 Accesses

Abstract

Bob died suddenly leaving his treasure to sister Alice. Moriarty will do anything to get it, so Alice hides the treasure together with Nipper, and promptly departs. Nipper is a low-cost RFID device that responds only to Alice’s calls—making it possible for Alice to locate the hidden treasure later (she is quite forgetful) when Moriarty is not around. We study the design of Nipper, the cryptographic mechanisms that support its functionality and the security of the application.

The HMV trademark comes from a painting by Francis Barraud who inherited from his late brother Mark a fox terrier, Nipper, a cylinder phonograph and a number of Mark’s recordings [11]. The painting portrays Nipper listening to the sound emanating from the trumpet of the phonograph.

This material is based upon work supported by the National Science Foundation under Grant No. 1027217.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Avoine, G.: RFID Security and Privacy Lounge (2010), http://www.avoine.net/rfid/

  2. Avoine, G., Oechslin, P.: A scalable and provably secure hash-based RFID protocol. In: PERCOMW 2005: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 110–114. IEEE Computer Society, Washington, DC, USA (2005)

    Chapter  Google Scholar 

  3. Burmester, M., de Medeiros, B.: The Security of EPC Gen2 Compliant RFID Protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 490–506. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Burmester, M., Munilla, J.: Flyweight authentication with forward and backward security. ACM Trans. Inf. Syst. Secur. 12 (2011), http://www.cs.fsu.edu/~burmeste/103.pdf (accepted August 27, 2010)

  5. Burmester, M., van Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006). IEEE Press (2006)

    Google Scholar 

  6. Danezis, G., Lewis, S., Anderson, R.: How Much is Location Privacy Worth? In: Fourth Workshop on the Economics of Information Security (WEIS 2005), June 2-3. Harvard University (2005)

    Google Scholar 

  7. Dimitriou, T.: A secure and efficient RFID protocol that can make big brother obsolete. In: Proc. Intern. Conf. on Pervasive Computing and Communications (PerCom 2006). IEEE Press (2006)

    Google Scholar 

  8. EPC Global. EPC tag data standards, vs. 1.3, http://www.epcglobalinc.org/standards/EPCglobal_Tag_Data_Standard_TDS_Version_1.3.pdf

  9. Hekimian-Williams, C., Grant, B., Liu, X., Zhang, Z., Kumar, P.: Accurate localization of rfid tags using phase difference. In: IEEE International Conference on RFID (RFID 2010), pp. 89–96. IEEE (2010)

    Google Scholar 

  10. Henrici, D., Müller, P.M.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proc. IEEE Intern. Conf. on Pervasive Computing and Communications, pp. 149–153 (2004)

    Google Scholar 

  11. His Master’s Voice, http://en.wikipedia.org/wiki/HisMaster'sVoice

  12. Iwata, T., Kurosawa, K.: OMAC: One-key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129–153. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Lee, Y.K., Batina, L., Singelee, D., Preneel, B., Verbauwhede, I.: Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. In: Sadeghi, A.-R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security, Information Security and Cryptography – THIS 2010, pp. 237–257. Springer, Heidelberg (2010)

    Google Scholar 

  14. Liu, L.: From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007, pp. 1429–1430. VLDB Endowment (2007)

    Google Scholar 

  15. Molnar, D., Soppera, A., Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 276–290. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: Proc. RFID Privacy Workshop (2003)

    Google Scholar 

  17. Poirot, J., Mcwilliams, G.: Navigation by back triangulation. IEEE Transactions on Aerospace and Electronic Systems AES-12(2), 270–274 (1976)

    Article  Google Scholar 

  18. RFIDNews. EarthSearch launches GPS-RFID hybrid solution, http://www.rfidnews.org/2009/03/16/earthsearch-launches-gps-rfid-hybrid-solution

  19. Sharma, S.E., Weiss, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  20. van Le, T., Burmester, M., de Medeiros, B.: Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange. In: Proc. of the ACM Symp. on Information, Computer, and Communications Security (ASIACCS 2007), pp. 242–252. ACM Press (2007)

    Google Scholar 

  21. WISP. Wireless Identification and Sensing Platform, Intel Labs, Seattle, http://seattle.intel-research.net/wisp/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Burmester, M. (2011). His Late Master’s Voice: Barking for Location Privacy. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds) Security Protocols XIX. Security Protocols 2011. Lecture Notes in Computer Science, vol 7114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25867-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25867-1_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25866-4

  • Online ISBN: 978-3-642-25867-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics