Skip to main content

A State-Aware RFID Privacy Model with Reader Corruption

  • Conference paper
Cyberspace Safety and Security (CSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7672))

Included in the following conference series:

  • 2538 Accesses

Abstract

A number of security models have been proposed for RFID systems. Recent studies show that current models tend to be limited in the number of properties they capture. Consequently, models are commonly unable to distinguish between protocols with regard to finer privacy properties. This paper proposes a privacy model that introduces previously unavailable expressions of privacy. Based on the well-studied notion of indistinguishability, the model also strives to be simpler, easier to use, and more intuitive compared to previous models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable RFID Systems: a Privacy-Preserving Protocol with Constant-Time Identification. In: The 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – DSN 2010, IEEE Computer Society, Chicago (2010)

    Google Scholar 

  2. Avoine, G.: Adversary Model for Radio Frequency Identification (LASEC-REPORT-2005-001) (September 2005)

    Google Scholar 

  3. Avoine, G., Coisel, I., Martin, T.: Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 138–157. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  4. Avoine, G., Lauradoux, C., Martin, T.: When Compromised Readers Meet RFID. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 36–50. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Bruso, M., Chatzikokolakis, K., den Hartog, J.: Formal Verification of Privacy for RFID Systems. In: Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom. IEEE (July 2010)

    Google Scholar 

  6. Chunhua, S., Yingjiu, L., Yunlei, Z., Robert, H.D., Yiming, Z., Jianying, Z.: A survey on privacy frameworks for RFID authentication. IEICE Transactions on Information and Systems E95.D(1), 2–11 (2012)

    Article  Google Scholar 

  7. Coisel, I., Martin, T.: Untangling rfid privacy models. Cryptology ePrint Archive, Report 2011/636 (2011), http://eprint.iacr.org/

  8. Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A New Framework for RFID Privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1–18. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Erguler, I., Anarim, E., Saldamli, G.: Unbalanced states violates RFID privacy. Journal of Intelligent Manufacturing 23, 1–9 (2012)

    Article  Google Scholar 

  10. Ha, J., Moon, S.-J., Zhou, J., Ha, J.C.: A New Formal Proof Model for RFID Location Privacy. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 267–281. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  11. Juels, A., Weis, S.: Defining Strong Privacy for RFID. In: International Conference on Pervasive Computing and Communications, PerCom 2007, pp. 342–347. IEEE Computer Society, New York (2007)

    Google Scholar 

  12. Lai, J., Deng, R.H., Li, Y.: Revisiting Unpredictability-Based RFID Privacy Models. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 475–492. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  13. Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219. ACM, New York (2004)

    Google Scholar 

  14. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to “Privacy-Friendly” Tags. In: RFID Privacy Workshop (2003)

    Google Scholar 

  15. Ouafi, K., Phan, R.C.-W.: Traceable Privacy of Recent Provably-Secure RFID Protocols. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 479–489. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  16. Paise, R.-I., Vaudenay, S.: Mutual Authentication in RFID: Security and Privacy. In: ASIACCS 2008, Tokyo, Japan, pp. 292–299. ACM Press (2008)

    Google Scholar 

  17. Van Le, T., Burmester, M., de Medeiros, B.: Universally Composable and Forward-secure RFID Authentication and Authenticated Key Exchange. In: Bao, F., Miller, S. (eds.) ACM Symposium on Information, Computer and Communications Security – ASIACCS 2007, Singapore, Republic of Singapore, pp. 242–252. ACM Press (March 2007)

    Google Scholar 

  18. Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, K., Nieto, J.G., Boyd, C. (2012). A State-Aware RFID Privacy Model with Reader Corruption. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35362-8_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35361-1

  • Online ISBN: 978-3-642-35362-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics