Abstract
Recent proposals for widespread deployment of Radio Frequency Identification (RFID) systems have raised significant concerns about consumer privacy. With current low-cost tag technology, these concerns are somewhat unavoidable, as the tags aren’t designed to differentiate between authorized readers and unauthorized ones, and likewise the readers can’t directly distinguish between tags they’re allowed to identify and those they aren’t. Moreover, the privacy risks for consumers translate directly into the potential for industrial espionage in supply-chain implementations, undermining the competitive advantages that businesses aim to realize by deploying RFID systems in the first place. This article outlines some of the recent research results in RFID privacy that attempt to address these concerns without significantly impacting the cost of the tags.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Dierks, T. and Allen, C: The TLS Protocol Version 1.0. IETF RFC 2246, January 1999. Available via http://www.rfc-editor.org/.
Fishkin, K.P. and Roy, S.: Enhancing RFID Privacy via Antenna Energy Analysis. Presented at MIT RFID Privacy Workshop, November 2003. Also Intel Research Seattle Technical Memo IRS-TR-03-012, November 2003. Available via http://seattleweb.intel-research.net/people/fishkin/.
Juels, A.: Minimalist Cryptography for RFID Tags. In submission, 2003. Available via http://www.ari-juels.com/.
Juels, A. and Brainard, J.: Soft Blocking: Flexible Blocker Tags on the Cheap. Manuscript, 2003. Available via http://www.ari-juels.com/.
Juels, A., Rivest, R.L., and Syzdlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In Atluri, V.: 8th ACM Conference on Computer and Communications Security, ACM Press, 2003, p. 103–111. Available via http://www.ari-juels.com/.
Kaliski, B.: Security and Privacy in RFID Systems. Presented at RSA Conference Japan 2004. Available via http://www.rsasecurity.com/rsalabs/.
Weis, S., Sarma, S.E., and Engels, D.W.: RFID Systems and Security and Privacy Implications. In Kaliski, B.: Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science Volume 2523, Springer, 2002, p. 454–470. Available via http://theory.lcs.mit.edu/~sweis/.
Weis, S., Sarma, S.E., and Engels, D.W: Radio-Frequency Identification: Risks and Challenges. In: CryptoBytes, Volume 6, No. 1, Winter/Spring, 2003. Available via http://www.rsasecurity.com/rsalabs/cryptobytes/.
Weis, S., Sarma, S.E., Rivest, R.L., and Engels, D.W: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Security in Pervasive Computing, Lecture Notes in Computer Science Volume 2802, Springer, 2003, p. 201–212. Available via http://theory.lcs.mit.edu/~sweis/.
World Wide Web Consortium: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation, 16 April 2002. Available via http://www.w3.org/TR/P3P/.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2004 Friedr. Vieweg & Sohn Verlagsgesellschaft/GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Kaliski, B. (2004). RFID Privacy: Challenges and Progress. In: ISSE 2004 — Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84984-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-322-84984-7_12
Publisher Name: Vieweg+Teubner Verlag
Print ISBN: 978-3-528-05910-1
Online ISBN: 978-3-322-84984-7
eBook Packages: Springer Book Archive