Summary
Eavesdropping RFID systems can violate privacy. We propose a privacy-friendly RFID system, in which the chip modulates its reply onto a noisy carrier provided by the reader, to protect the back-channel against eavesdropping. This method does not require additional protective devices and resolves some practical weaknesses of previous proposals.
Zusammenfassung
Abhörangriffe gegen RFID-Systeme können die Privatsphäre verletzen. Der Autor schlägt ein datenschutzfreundliches RFID-System vor, in dem der Chip seine Antwort auf das verrauschte Trägersignal des Lesegerätes moduliert, um den Antwortkanal gegen Abhören zu sichern. Diese Technik benötigt keine zusätzlichen Schutzgeräte und vermeidet einige praktische Probleme vorangegangener Ansätze.
Similar content being viewed by others
References
Bluetooth (2006): 'Simple Pairing', White Paper. http://www.bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm.
Bringer, J., Chabanne, H. (2006): On the wiretap channel induced by noisy tags. Proc. of European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks: 113–120.
Castellucia, C., Mutaf, P. (2005): Shake Them Up. Proc. of Mobile Systems, Applications and Services (Mobisys): 51–64.
Castelluccia, C., Avoine, G. (2006): Noisy tags: pretty good key exchange protocol for RFID tags. Proc. of Int. Conf. on Smart Card Research and Advanced Applications (CARDIS), LNCS Vol. 3928: 289–299.
Chabanne, H., Fumaroli, G. (2006): Noisy cryptographic protocols for low-cost RFID tags. IEEE Transactions on Information Theory 52 (8).
Hancke, G. P. (2006): Practical attacks on proximity identification systems (Short Paper). Proc. of the IEEE Symp. on Security and Privacy: 328–333.
Haselsteiner, E., Breitfuss, K. (2006): Security in near field communication. Proc. of Workshop on RFID Security: 3–13.
ISO 14443 (2001): Identification cards – Contactless integrated circuit cards – Proximity cards.
ISO 18092 (2004): Information technology – telecommunications and information exchange between systems – Near Field Communication – Interface and Protocol (NFCIP-1).
Juels, A., Rivest, R., Szydlo, M. (2003): The blocker tag: selective blocking of RFID tags for consumer privacy. Proc. of Conf. on Computer and Communications Security (CCS). pp 103–111.
Juels, A., Molnar, D., Wagner, D. (2005): Security and privacy issues in E-passports. Proc. IEEE/CreateNet SecureComm. pp 74–88.
Proakis, J. G. (1995): Digital communications, 3rd ed. McGraw-Hill.
Rieback, M. R., Gaydadjiev, G. N., Crispo, B., Hofman R. F. H., Tanenbaum A. S. (2006): A platform for RFID security and privacy administration. 20th USENIX/SAGE Large Installation System Administration Conf. (LISA).
Shannon, C. E. (1948): A mathematical theory of communications. Bell Systems Technical Journal, 27: 623–656.
Wyner, A. D. (1975): The wire-tap channel. AT&T Tech J 54: 1355–1387.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Hancke, G. Modulating a noisy carrier signal for eavesdropping-resistant HF RFID. Elektrotech. Inftech. 124, 404–408 (2007). https://doi.org/10.1007/s00502-007-0479-7
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s00502-007-0479-7