Skip to main content
Log in

Modulating a noisy carrier signal for eavesdropping-resistant HF RFID

Modulation eines verrauschten Trägersignals für abhörsichere HF RFID

  • Originalarbeit
  • Published:
e & i Elektrotechnik und Informationstechnik Aims and scope Submit manuscript

Summary

Eavesdropping RFID systems can violate privacy. We propose a privacy-friendly RFID system, in which the chip modulates its reply onto a noisy carrier provided by the reader, to protect the back-channel against eavesdropping. This method does not require additional protective devices and resolves some practical weaknesses of previous proposals.

Zusammenfassung

Abhörangriffe gegen RFID-Systeme können die Privatsphäre verletzen. Der Autor schlägt ein datenschutzfreundliches RFID-System vor, in dem der Chip seine Antwort auf das verrauschte Trägersignal des Lesegerätes moduliert, um den Antwortkanal gegen Abhören zu sichern. Diese Technik benötigt keine zusätzlichen Schutzgeräte und vermeidet einige praktische Probleme vorangegangener Ansätze.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Bluetooth (2006): 'Simple Pairing', White Paper. http://www.bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm.

  • Bringer, J., Chabanne, H. (2006): On the wiretap channel induced by noisy tags. Proc. of European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks: 113–120.

  • Castellucia, C., Mutaf, P. (2005): Shake Them Up. Proc. of Mobile Systems, Applications and Services (Mobisys): 51–64.

  • Castelluccia, C., Avoine, G. (2006): Noisy tags: pretty good key exchange protocol for RFID tags. Proc. of Int. Conf. on Smart Card Research and Advanced Applications (CARDIS), LNCS Vol. 3928: 289–299.

    Article  Google Scholar 

  • Chabanne, H., Fumaroli, G. (2006): Noisy cryptographic protocols for low-cost RFID tags. IEEE Transactions on Information Theory 52 (8).

  • Hancke, G. P. (2006): Practical attacks on proximity identification systems (Short Paper). Proc. of the IEEE Symp. on Security and Privacy: 328–333.

  • Haselsteiner, E., Breitfuss, K. (2006): Security in near field communication. Proc. of Workshop on RFID Security: 3–13.

  • ISO 14443 (2001): Identification cards – Contactless integrated circuit cards – Proximity cards.

  • ISO 18092 (2004): Information technology – telecommunications and information exchange between systems – Near Field Communication – Interface and Protocol (NFCIP-1).

  • Juels, A., Rivest, R., Szydlo, M. (2003): The blocker tag: selective blocking of RFID tags for consumer privacy. Proc. of Conf. on Computer and Communications Security (CCS). pp 103–111.

  • Juels, A., Molnar, D., Wagner, D. (2005): Security and privacy issues in E-passports. Proc. IEEE/CreateNet SecureComm. pp 74–88.

  • Proakis, J. G. (1995): Digital communications, 3rd ed. McGraw-Hill.

  • Rieback, M. R., Gaydadjiev, G. N., Crispo, B., Hofman R. F. H., Tanenbaum A. S. (2006): A platform for RFID security and privacy administration. 20th USENIX/SAGE Large Installation System Administration Conf. (LISA).

  • Shannon, C. E. (1948): A mathematical theory of communications. Bell Systems Technical Journal, 27: 623–656.

    MathSciNet  Google Scholar 

  • Wyner, A. D. (1975): The wire-tap channel. AT&T Tech J 54: 1355–1387.

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hancke, G. Modulating a noisy carrier signal for eavesdropping-resistant HF RFID. Elektrotech. Inftech. 124, 404–408 (2007). https://doi.org/10.1007/s00502-007-0479-7

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00502-007-0479-7

Keywords

Schlüsselwörter

Navigation