Abstract
Bob died suddenly leaving his treasure to sister Alice. Moriarty will do anything to get it, so Alice hides the treasure together with Nipper, and promptly departs. Nipper is a low-cost RFID device that responds only to Alice’s calls—making it possible for Alice to locate the hidden treasure later (she is quite forgetful) when Moriarty is not around. We study the design of Nipper, the cryptographic mechanisms that support its functionality and the security of the application.
The HMV trademark comes from a painting by Francis Barraud who inherited from his late brother Mark a fox terrier, Nipper, a cylinder phonograph and a number of Mark’s recordings [11]. The painting portrays Nipper listening to the sound emanating from the trumpet of the phonograph.
This material is based upon work supported by the National Science Foundation under Grant No. 1027217.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Avoine, G.: RFID Security and Privacy Lounge (2010), http://www.avoine.net/rfid/
Avoine, G., Oechslin, P.: A scalable and provably secure hash-based RFID protocol. In: PERCOMW 2005: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 110–114. IEEE Computer Society, Washington, DC, USA (2005)
Burmester, M., de Medeiros, B.: The Security of EPC Gen2 Compliant RFID Protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 490–506. Springer, Heidelberg (2008)
Burmester, M., Munilla, J.: Flyweight authentication with forward and backward security. ACM Trans. Inf. Syst. Secur. 12 (2011), http://www.cs.fsu.edu/~burmeste/103.pdf (accepted August 27, 2010)
Burmester, M., van Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006). IEEE Press (2006)
Danezis, G., Lewis, S., Anderson, R.: How Much is Location Privacy Worth? In: Fourth Workshop on the Economics of Information Security (WEIS 2005), June 2-3. Harvard University (2005)
Dimitriou, T.: A secure and efficient RFID protocol that can make big brother obsolete. In: Proc. Intern. Conf. on Pervasive Computing and Communications (PerCom 2006). IEEE Press (2006)
EPC Global. EPC tag data standards, vs. 1.3, http://www.epcglobalinc.org/standards/EPCglobal_Tag_Data_Standard_TDS_Version_1.3.pdf
Hekimian-Williams, C., Grant, B., Liu, X., Zhang, Z., Kumar, P.: Accurate localization of rfid tags using phase difference. In: IEEE International Conference on RFID (RFID 2010), pp. 89–96. IEEE (2010)
Henrici, D., Müller, P.M.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proc. IEEE Intern. Conf. on Pervasive Computing and Communications, pp. 149–153 (2004)
His Master’s Voice, http://en.wikipedia.org/wiki/HisMaster'sVoice
Iwata, T., Kurosawa, K.: OMAC: One-key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129–153. Springer, Heidelberg (2003)
Lee, Y.K., Batina, L., Singelee, D., Preneel, B., Verbauwhede, I.: Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. In: Sadeghi, A.-R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security, Information Security and Cryptography – THIS 2010, pp. 237–257. Springer, Heidelberg (2010)
Liu, L.: From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007, pp. 1429–1430. VLDB Endowment (2007)
Molnar, D., Soppera, A., Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 276–290. Springer, Heidelberg (2006)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: Proc. RFID Privacy Workshop (2003)
Poirot, J., Mcwilliams, G.: Navigation by back triangulation. IEEE Transactions on Aerospace and Electronic Systems AES-12(2), 270–274 (1976)
RFIDNews. EarthSearch launches GPS-RFID hybrid solution, http://www.rfidnews.org/2009/03/16/earthsearch-launches-gps-rfid-hybrid-solution
Sharma, S.E., Weiss, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)
van Le, T., Burmester, M., de Medeiros, B.: Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange. In: Proc. of the ACM Symp. on Information, Computer, and Communications Security (ASIACCS 2007), pp. 242–252. ACM Press (2007)
WISP. Wireless Identification and Sensing Platform, Intel Labs, Seattle, http://seattle.intel-research.net/wisp/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Burmester, M. (2011). His Late Master’s Voice: Barking for Location Privacy. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds) Security Protocols XIX. Security Protocols 2011. Lecture Notes in Computer Science, vol 7114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25867-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-25867-1_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25866-4
Online ISBN: 978-3-642-25867-1
eBook Packages: Computer ScienceComputer Science (R0)