Abstract
Location-aware technology and its applications are fundamental to ubiquitous computing. Essential to this technology is object localization and identification. RFID (radio frequency identification) technology has been shown to be very effective for identification and tracking applications in industry, transport, agriculture and health-care. However it can also be used for accurate object localization. Indeed RFID technology is ideally suited for such applications, and more generally for context-aware computing, because of the low cost, low power, light weight and endurance of RFID tags. In this article we study the security of RFID localization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alippi, C., Cogliati, D., Vanini, G.: A statistical approach to localize passive RFIDs. In: Proc. of the IEEE Int. Symp. on Circuits and Systems (ISCAS), pp. 843–846. Island of Kos, Greece (2006)
Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Proc. ACM Conf. on Computer and Communication Security (ACM CCS 2005), pp. 92–101. ACM Press, New York (2005)
Avoine, G.: RFID Security and Privacy Lounge (2010), http://www.avoine.net/rfid/
Avoine, G., Oechslin, P.: A scalable and provably secure hash-based rfid protocol. In: PERCOMW 2005: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 110–114. IEEE Computer Society, Washington, DC,USA (2005)
Bahl, P., Padmanabhan, V.N.: Radar: An in-building rf-based user location and tracking system. In: INFOCOM, pp. 775–784 (2000)
Barsumian, B.R., Jones, T.H.: U.S. Patent # 6, pp. 163–259 (December 19, 2010)
Brunato, M., Battiti, R.: Statistical learning theory for location fingerprinting in wireless LANs. Computer Networks 47, 825–845 (2005)
Burmester, M., van Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006), IEEE Press, Los Alamitos (2006)
Burmester, M.: His late master’s voice, barking for location privacy
Burmester, M., de Medeiros, B.: The Security of EPC Gen2 Compliant RFID Protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 490–506. Springer, Heidelberg (2008)
Burmester, M., Munilla, J.: Flyweight authentication with forward and backward security. ACM Trans. Inf. Syst. Secur. 12 (August 27, 2010) (accepted), http://www.cs.fsu.edu/burmeste/103.pdf,2011
Chang, H.-L., Tian, J.-B., Lai, T.-T., Chu, H.-H., Huang, P.: Spinning beacons for precise indoor localization. In: ACM Third International Conference on Embedded Networked Sensor Systems, SenSys 2008 (November 2008)
Cilek, F., Seemann, K., Brenk, D., Essel, J., Weigel, R., Holweg, G., Heidrich, J.: Ultra low power oscillator for UHF RFID transponder. In: IEEE Frequency Control Symposium, 2008, 19-21 May, pp. 418–421. IEEE, Los Alamitos (2008)
Coco, S., Laudani, A., Mazzurco, L.: A novel 2-D ray tracing procedure for the localization of EM field sources in urban environment. IEEE Transactions on Magnetics 40(2), 1132–1135 (2004)
Danezis, G., Lewis, S., Anderson, R.: How Much is Location Privacy Worth? In: Fourth Workshop on the Economics of Information Security (WEIS 2005), June 23, vol. 3. Harvard University, Cambridge (2005)
Dimitriou, T.: A secure and efficient RFID protocol that can make big brother obsolete. In: Proc. Intern. Conf. on Pervasive Computing and Communications (PerCom 2006). IEEE Press, Los Alamitos (2006)
Elnahrawy, E., Martin, R.P., Ju, W.h., Krishnan, P., Madigan, D.: Bayesian indoor positioning systems. In: Infocom, pp. 1217–1227 (2005)
EPC Global. EPC tag data standards, vs. 1.3, http://www.epcglobalinc.org/standards/EPCglobal_Tag_Data_Standard_TDS_Version_1.3.pdf
Fortune, S.J., Gay, D.M., Kernighan, B.W., Landron, O., Valenzuela, R.A., Wright, M.H.: Wise design of indoor wireless systems: practical computation and optimization. IEEE Computational Science & Engineering 2(1), 58–68 (1995)
Hahnel, D., Burgard, W., Fox, D., Fishkin, K., Philipose, M.: Mapping and Localization with RFID Technology. In: Proceedings of IEEE International Conference on Robotics and Automation, pp. 1015–1020 (2004)
Cory, H.-W., Grant, B., Liu, X., Zhang, Z., Kumar, P.: Accurate localization of RFID tags using phase difference. In: IEEE International Conference on RFID 2010. IEEE, Los Alamitos (2010)
Henrici, D., Müller, P.M.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proc. IEEE Intern. Conf. on Pervasive Computing and Communications, pp. 149–153 (2004)
His Master’s Voice, http://en.wikipedia.org/wiki/
ISO/IEC. Standard # (1800), 0 – RFID Air Interface Standard, http://www.hightechaid.com/standards/18000.htm
Iwata, T., Kurosawa, K.: OMAC: One-Key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129–153. Springer, Heidelberg (2003)
Joho, D., Plagemann, C., Burgard, W.: Modeling RFID Signal Strength and Tag Detection for Localization and Mapping. In: Proceedings of the IEEE International Conference on Robotics and Automation (ICRA), Kobe, Japan, pp. 3160–3165 (May 2009)
Jones, T.H., Barsumian, B.R.: U.S. Patent #6,057,765, (May 2, 2010)
Kleiner, A., Dornhege, C., Dali, S.: Mapping disaster areas jointly: RFID-coordinated SLAM by humans and robots. In: Proc. of the IEEE Int. Workshop on Safety, Security and Rescue Robotics, SSRR (2007)
Kusy, B., Ledeczi, A., Koutsoukos, X.: Tracking mobile nodes using rf doppler shifts. In: SenSys 2007: Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, pp. 29–42. ACM, USA (2007)
Kusy, B., Sallai, J., Balogh, G., Ledeczi, A., Protopopescu, V., Tolliver, J., DeNap, F., Parang, M.: Radio interferometric tracking of mobile wireless nodes. In: Proc. of MobiSys 2007(2007)
Ledeczi, A., Volgyesi, P., Sallai, J., Kusy, B., Koutsoukos, X., Maroti, M.: Towards Precise Indoor RF Localization. In: HOTEMNETS 2008, Charlottesville, VA (June 2008)
Lee, Y.K., Batina, L., Singelee, D., Preneel, B., Verbauwhede, I.: Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. In: Towards Hardware-Intrinsic Security, Information Security and Cryptography – THIS 2010, pp. 237–257. Springer, Heidelberg (November 2010)
Li, B., Kam, J., Lui, J., Dempster, A.G.: Use of directional information in wireless LAN based indoor positioning. In: IGNSS Symposium (2007)
Liu, L.: From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd International Conference on Very large Data Bases, VLDB 2007, pp. 1429–1430. VLDB Endowment (2007)
Maroti, M., Kusy, B., Balogh, G., Volgyesi, P., Molnar, K., Nadas, A., Dora, S., Ledeczi, A.: Radio Interferometric Geolocation. In: ACM Third International Conference on Embedded Networked Sensor Systems (SenSys 2005), San Diego, CA, pp. 1–12 (November 2005)
Molnar, D., Soppera, A., Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 276–290. Springer, Heidelberg (2006)
Nguyen, X., Jordan, M., Sinopoli, B.: A kernel-based learning approach to ad hoc sensor network localization. ACM Transactions on Sensor Networks (2005)
Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.: LANDMARC: Indoor Location Sensing Using Active RFID. ACM Wireless Networks 10(6), 701–710 (2004)
Nikitin, P.V., Rao, K.V.S., Lazar, S.: An Overview of Near Field UHF RFID. In: IEEE International Conference on RFID 2007, pp. 167–174 (March 2007)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: Proc. RFID Privacy Workshop (2003)
Rappaport, T.S.: Wireless Communications - Principles & Practice, 2nd edn. Prentice Hall PTR, Englewood Cliffs (2003)
RFIDNews. EarthSearch launches GPS-RFID hybrid solution, http://www.rfidnews.org/2009/03/16/earthsearch-launches-gps-rfid-hybrid-solution
Sallai, J., Ledeczi, A., Amundson, I., Koutsoukos, X., Maroti, M.: Using RF received phase for indoor tracking. HotEmNets (June 2010)
Seshadri, V., Zaruba, G.V., Huber, M.: A Bayesian sampling approach to in-door localization of wireless devices using received signal strength indication. In: Proc. of the IEEE Int. Conf. on Pervasive Computing and Communications (PerCom), pp. 75–84 (2005)
Sharma, S.E., Weiss, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)
Tayebi, A., Gomez, J., Saez de Adana, F., Gutierrez, O.: The application of ray-tracing to mobile localization using the direction of arrival and received signal strength in multipath indoor environments. Progress In Electromagnetics Research 91, 1–15 (2009)
van Le, T., Burmester, M., de Medeiros, B.: Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange. In: Proc. of the ACM Symp. on Information, Computer, and Communications Security (ASIACCS 2007), pp. 242–252. ACM Press, New York (2007)
WISP. Wireless Identification and Sensing Platform, Intel Labs, Seattle, http://seattle.intel-research.net/wisp/
Youssef, M., Agrawala, A.: The horus WLAN location determination system. In: MobiSys, pp. 205–218 (2005)
Zhang, T., Chen, Z., Ouyang, Y., Hao, J., Xiong, Z.: An Improved RFID-Based Locating Algorithm by Eliminating Diversity of Active Tags for Indoor Environment. The Computer Journal 52(8), 902–909 (2009)
Zhao, Y., Liu, Y., Ni, L.M.: VIRE: Active RFID-based localization using virtual reference elimination. In: Proceedings of ICPP (2007)
Zhou, J., Shi, J.: RFID localization algorithms and applications, a review. Journal of Intelligent Manufacturing, 1–13 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Burmester, M. (2012). Localization Privacy. In: Naccache, D. (eds) Cryptography and Security: From Theory to Applications. Lecture Notes in Computer Science, vol 6805. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28368-0_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-28368-0_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28367-3
Online ISBN: 978-3-642-28368-0
eBook Packages: Computer ScienceComputer Science (R0)