Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6805))

Abstract

Location-aware technology and its applications are fundamental to ubiquitous computing. Essential to this technology is object localization and identification. RFID (radio frequency identification) technology has been shown to be very effective for identification and tracking applications in industry, transport, agriculture and health-care. However it can also be used for accurate object localization. Indeed RFID technology is ideally suited for such applications, and more generally for context-aware computing, because of the low cost, low power, light weight and endurance of RFID tags. In this article we study the security of RFID localization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alippi, C., Cogliati, D., Vanini, G.: A statistical approach to localize passive RFIDs. In: Proc. of the IEEE Int. Symp. on Circuits and Systems (ISCAS), pp. 843–846. Island of Kos, Greece (2006)

    Google Scholar 

  2. Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Proc. ACM Conf. on Computer and Communication Security (ACM CCS 2005), pp. 92–101. ACM Press, New York (2005)

    Chapter  Google Scholar 

  3. Avoine, G.: RFID Security and Privacy Lounge (2010), http://www.avoine.net/rfid/

  4. Avoine, G., Oechslin, P.: A scalable and provably secure hash-based rfid protocol. In: PERCOMW 2005: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 110–114. IEEE Computer Society, Washington, DC,USA (2005)

    Chapter  Google Scholar 

  5. Bahl, P., Padmanabhan, V.N.: Radar: An in-building rf-based user location and tracking system. In: INFOCOM, pp. 775–784 (2000)

    Google Scholar 

  6. Barsumian, B.R., Jones, T.H.: U.S. Patent # 6, pp. 163–259 (December 19, 2010)

    Google Scholar 

  7. Brunato, M., Battiti, R.: Statistical learning theory for location fingerprinting in wireless LANs. Computer Networks 47, 825–845 (2005)

    Article  MATH  Google Scholar 

  8. Burmester, M., van Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006), IEEE Press, Los Alamitos (2006)

    Google Scholar 

  9. Burmester, M.: His late master’s voice, barking for location privacy

    Google Scholar 

  10. Burmester, M., de Medeiros, B.: The Security of EPC Gen2 Compliant RFID Protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 490–506. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  11. Burmester, M., Munilla, J.: Flyweight authentication with forward and backward security. ACM Trans. Inf. Syst. Secur. 12 (August 27, 2010) (accepted), http://www.cs.fsu.edu/burmeste/103.pdf,2011

  12. Chang, H.-L., Tian, J.-B., Lai, T.-T., Chu, H.-H., Huang, P.: Spinning beacons for precise indoor localization. In: ACM Third International Conference on Embedded Networked Sensor Systems, SenSys 2008 (November 2008)

    Google Scholar 

  13. Cilek, F., Seemann, K., Brenk, D., Essel, J., Weigel, R., Holweg, G., Heidrich, J.: Ultra low power oscillator for UHF RFID transponder. In: IEEE Frequency Control Symposium, 2008, 19-21 May, pp. 418–421. IEEE, Los Alamitos (2008)

    Chapter  Google Scholar 

  14. Coco, S., Laudani, A., Mazzurco, L.: A novel 2-D ray tracing procedure for the localization of EM field sources in urban environment. IEEE Transactions on Magnetics 40(2), 1132–1135 (2004)

    Article  Google Scholar 

  15. Danezis, G., Lewis, S., Anderson, R.: How Much is Location Privacy Worth? In: Fourth Workshop on the Economics of Information Security (WEIS 2005), June 23, vol. 3. Harvard University, Cambridge (2005)

    Google Scholar 

  16. Dimitriou, T.: A secure and efficient RFID protocol that can make big brother obsolete. In: Proc. Intern. Conf. on Pervasive Computing and Communications (PerCom 2006). IEEE Press, Los Alamitos (2006)

    Google Scholar 

  17. Elnahrawy, E., Martin, R.P., Ju, W.h., Krishnan, P., Madigan, D.: Bayesian indoor positioning systems. In: Infocom, pp. 1217–1227 (2005)

    Google Scholar 

  18. EPC Global. EPC tag data standards, vs. 1.3, http://www.epcglobalinc.org/standards/EPCglobal_Tag_Data_Standard_TDS_Version_1.3.pdf

  19. Fortune, S.J., Gay, D.M., Kernighan, B.W., Landron, O., Valenzuela, R.A., Wright, M.H.: Wise design of indoor wireless systems: practical computation and optimization. IEEE Computational Science & Engineering 2(1), 58–68 (1995)

    Article  Google Scholar 

  20. Hahnel, D., Burgard, W., Fox, D., Fishkin, K., Philipose, M.: Mapping and Localization with RFID Technology. In: Proceedings of IEEE International Conference on Robotics and Automation, pp. 1015–1020 (2004)

    Google Scholar 

  21. Cory, H.-W., Grant, B., Liu, X., Zhang, Z., Kumar, P.: Accurate localization of RFID tags using phase difference. In: IEEE International Conference on RFID 2010. IEEE, Los Alamitos (2010)

    Google Scholar 

  22. Henrici, D., Müller, P.M.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proc. IEEE Intern. Conf. on Pervasive Computing and Communications, pp. 149–153 (2004)

    Google Scholar 

  23. His Master’s Voice, http://en.wikipedia.org/wiki/

  24. ISO/IEC. Standard # (1800), 0 – RFID Air Interface Standard, http://www.hightechaid.com/standards/18000.htm

  25. Iwata, T., Kurosawa, K.: OMAC: One-Key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129–153. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  26. Joho, D., Plagemann, C., Burgard, W.: Modeling RFID Signal Strength and Tag Detection for Localization and Mapping. In: Proceedings of the IEEE International Conference on Robotics and Automation (ICRA), Kobe, Japan, pp. 3160–3165 (May 2009)

    Google Scholar 

  27. Jones, T.H., Barsumian, B.R.: U.S. Patent #6,057,765, (May 2, 2010)

    Google Scholar 

  28. Kleiner, A., Dornhege, C., Dali, S.: Mapping disaster areas jointly: RFID-coordinated SLAM by humans and robots. In: Proc. of the IEEE Int. Workshop on Safety, Security and Rescue Robotics, SSRR (2007)

    Google Scholar 

  29. Kusy, B., Ledeczi, A., Koutsoukos, X.: Tracking mobile nodes using rf doppler shifts. In: SenSys 2007: Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, pp. 29–42. ACM, USA (2007)

    Chapter  Google Scholar 

  30. Kusy, B., Sallai, J., Balogh, G., Ledeczi, A., Protopopescu, V., Tolliver, J., DeNap, F., Parang, M.: Radio interferometric tracking of mobile wireless nodes. In: Proc. of MobiSys 2007(2007)

    Google Scholar 

  31. Ledeczi, A., Volgyesi, P., Sallai, J., Kusy, B., Koutsoukos, X., Maroti, M.: Towards Precise Indoor RF Localization. In: HOTEMNETS 2008, Charlottesville, VA (June 2008)

    Google Scholar 

  32. Lee, Y.K., Batina, L., Singelee, D., Preneel, B., Verbauwhede, I.: Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. In: Towards Hardware-Intrinsic Security, Information Security and Cryptography – THIS 2010, pp. 237–257. Springer, Heidelberg (November 2010)

    Google Scholar 

  33. Li, B., Kam, J., Lui, J., Dempster, A.G.: Use of directional information in wireless LAN based indoor positioning. In: IGNSS Symposium (2007)

    Google Scholar 

  34. Liu, L.: From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd International Conference on Very large Data Bases, VLDB 2007, pp. 1429–1430. VLDB Endowment (2007)

    Google Scholar 

  35. Maroti, M., Kusy, B., Balogh, G., Volgyesi, P., Molnar, K., Nadas, A., Dora, S., Ledeczi, A.: Radio Interferometric Geolocation. In: ACM Third International Conference on Embedded Networked Sensor Systems (SenSys 2005), San Diego, CA, pp. 1–12 (November 2005)

    Google Scholar 

  36. Molnar, D., Soppera, A., Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 276–290. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  37. Nguyen, X., Jordan, M., Sinopoli, B.: A kernel-based learning approach to ad hoc sensor network localization. ACM Transactions on Sensor Networks (2005)

    Google Scholar 

  38. Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.: LANDMARC: Indoor Location Sensing Using Active RFID. ACM Wireless Networks 10(6), 701–710 (2004)

    Article  Google Scholar 

  39. Nikitin, P.V., Rao, K.V.S., Lazar, S.: An Overview of Near Field UHF RFID. In: IEEE International Conference on RFID 2007, pp. 167–174 (March 2007)

    Google Scholar 

  40. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: Proc. RFID Privacy Workshop (2003)

    Google Scholar 

  41. Rappaport, T.S.: Wireless Communications - Principles & Practice, 2nd edn. Prentice Hall PTR, Englewood Cliffs (2003)

    Google Scholar 

  42. RFIDNews. EarthSearch launches GPS-RFID hybrid solution, http://www.rfidnews.org/2009/03/16/earthsearch-launches-gps-rfid-hybrid-solution

  43. Sallai, J., Ledeczi, A., Amundson, I., Koutsoukos, X., Maroti, M.: Using RF received phase for indoor tracking. HotEmNets (June 2010)

    Google Scholar 

  44. Seshadri, V., Zaruba, G.V., Huber, M.: A Bayesian sampling approach to in-door localization of wireless devices using received signal strength indication. In: Proc. of the IEEE Int. Conf. on Pervasive Computing and Communications (PerCom), pp. 75–84 (2005)

    Google Scholar 

  45. Sharma, S.E., Weiss, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)

    Google Scholar 

  46. Tayebi, A., Gomez, J., Saez de Adana, F., Gutierrez, O.: The application of ray-tracing to mobile localization using the direction of arrival and received signal strength in multipath indoor environments. Progress In Electromagnetics Research 91, 1–15 (2009)

    Article  Google Scholar 

  47. van Le, T., Burmester, M., de Medeiros, B.: Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange. In: Proc. of the ACM Symp. on Information, Computer, and Communications Security (ASIACCS 2007), pp. 242–252. ACM Press, New York (2007)

    Chapter  Google Scholar 

  48. WISP. Wireless Identification and Sensing Platform, Intel Labs, Seattle, http://seattle.intel-research.net/wisp/

  49. Youssef, M., Agrawala, A.: The horus WLAN location determination system. In: MobiSys, pp. 205–218 (2005)

    Google Scholar 

  50. Zhang, T., Chen, Z., Ouyang, Y., Hao, J., Xiong, Z.: An Improved RFID-Based Locating Algorithm by Eliminating Diversity of Active Tags for Indoor Environment. The Computer Journal 52(8), 902–909 (2009)

    Article  Google Scholar 

  51. Zhao, Y., Liu, Y., Ni, L.M.: VIRE: Active RFID-based localization using virtual reference elimination. In: Proceedings of ICPP (2007)

    Google Scholar 

  52. Zhou, J., Shi, J.: RFID localization algorithms and applications, a review. Journal of Intelligent Manufacturing, 1–13 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Burmester, M. (2012). Localization Privacy. In: Naccache, D. (eds) Cryptography and Security: From Theory to Applications. Lecture Notes in Computer Science, vol 6805. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28368-0_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28368-0_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28367-3

  • Online ISBN: 978-3-642-28368-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics