Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/11601494_12guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

RFID system with fairness within the framework of security and privacy

Published: 13 July 2005 Publication History

Abstract

Radio Frequency Identification (RFID) systems are expected to be widely deployed in automated identification and supply-chain applications. Although RFID systems have several advantages, the technology may also create new threats to user privacy. In this paper, we propose the Fair RFID system. This involves improving the security and privacy of existing RFID systems while keeping in line with procedures already accepted by the industrial world. The proposed system enables the protection of users’ privacy from unwanted scanning, and, when necessary, is conditionally traceable to the tag by authorized administrators.

References

[1]
C. Cachin. On-Line Secret Sharing. Cryptography and Coding: 5th IMA Conference, LNCS 1025, pp. 190-198, Springer-Verlag, 1995.
[2]
L. Chen, D. Gollmann, C. J. Mitchell and P. Wild. Secret sharing with Reusable Polynomial. 2nd Australasian Conference on Information Security and Privacy, ACISP 97, LNCS 1270, pp. 183-193, Springer-Verlag, 1997.
[3]
D. Engels. The Reader Collision Problem. Technical Report. MIT-AUTOID-WH- 007, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org.
[4]
D. M. Ewatt and M. Hayes. Gillette razors get new edge: RFID tags. Information Week, 13 January 2003. Available from http://www.informationweek.com.
[5]
P. Fedlman. A Practical scheme for Non-interactive Verifiable secret sharing. 28th Annual Symposium on the Foundation of Computer Science, pp. 427-437, 1987.
[6]
K. Finkenzeller. RFID Handbook, John Wiley and Sons. 1999.
[7]
G. Avoine and P. Oechslin. A Scalable and Provably Secure Hash-Based RFID Protocol. 2nd IEEE International Workshop on Pervqsive Computing and Communications Security, PerSec 2005, pp. 110-114, IEEE, 2005.
[8]
G. Avoine and P. Oechslin. RFID Traceability: A Multilayer Problem. Financial Cryptography, FC'05, LNCS 3570, pp. 125-140, Springer-Verlag, 2005.
[9]
A. Juels and R. Pappu. Squealing Euros: Privacy protection in RFID-enabled banknotes. Financial Cryptography, FC'03, LNCS 2742, pp. 103-121, Springer-Verlag, 2003.
[10]
A. Juels, R. L. Rivest and M. Szydlo. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111, 2003.
[11]
S. J. Kim, S. J. Park and D. H. Won. Proxy Signatures, Revisited. International Conference on Information and Communications Security, ICISC'97, LNCS 1334, pp. 223-232, Springer-Verlag, 1997.
[12]
H. Knospe and H. Pobl. RFID Security. Information Security Technical Report, vol. 9, issue 4, pp. 39-50, Elsevier, 2004.
[13]
MIT Auto-ID Center (EPCglobal), http://www.epcglobalinc.org.
[14]
M. Ohkubo, K. Suzuki, and S. Kinoshita. A Cryptographic Approach to "Privacy-Friendly" tag. RFID Privacy Workshop, Nov 2003. http://www.rfidprivacy.org/
[15]
T. P. Pedersen. A Threshold cryptosystem without a trusted party. Advances in Cryptology-EUROCRYPT'91: Workshop on the Theory and Application of Cryptographic Techniques, LNCS 547, pp. 522-526, Springer-verlag, 1991.
[16]
K. W. Rhee, J. Kwak, S. J. Kim, and D. H. Won. Challenge-Response Based RFID Authentication Protocols for Distributed Database Environment. Second International Conference on Security in Pervasive Computing, SPC 2005, LNCS 3450, pp. 70-84, Springer-Verlag, 2005.
[17]
S. E. Sarma. Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org.
[18]
S. E. Sarma, S. A.Weis, and D. W. Engels. RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT, 2002.
[19]
S. E. Sarma, S. A. Weis, and D. W. Engels. Radio-frequency identification systems. Workshop on Cryptographic Hardware and Embedded Systems, CHES'02, LNCS 2523, pp. 454-469, Springer-Verlag, 2002.
[20]
S. E. Sarma, S. A. Weis, and D. W. Engels. Radio-frequency-identification security risks and challenges. CryptoBytes, 6(1), 2003.
[21]
T. Scharfeld. An Analysis of the Fundamental Constraints on Low Cost Passive Radio-Frequency Identification System Design. MS Thesis, Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge, MA 02139, 2001.
[22]
Security technology: Where's the smart money? The Economist, pages 69-70, 9 February 2002.
[23]
A. Shamir, How to share a secret. Communication of the ACM, vol. 21, pp. 120-126, 1979.
[24]
M. Tompa and H. Woll. How to share a secret with cheater. Journal of Cryptology, vol. 1, pp. 133-138, 1988.
[25]
I. Vajda and L. Buttyan. Lightweight Authentication Protocols for Low-Cost RFID Tags. 2nd Workshop on Security in Ubiquitous Computing, Ubicomp 2003, 2003.
[26]
S. A. Weis. Radio-frequency identification security and privacy. Master's thesis, M.I.T. May 2003.
[27]
S.A. Weis, S. Sarma, R. Rivest, and D. Engels. Security andprivacy aspects of low-cost radio frequency identification systems. First International Conference on Security in Pervasive Computing, SPC 2004, LNCS 2802, pp. 201-212, Springer-Verlag, 2004.

Cited By

View all
  • (2006)Efficient RFID authentication protocol for minimizing RFID tag computationProceedings of the 1st international conference on Advances in hybrid information technology10.5555/1782654.1782719(607-616)Online publication date: 9-Nov-2006
  • (2006)Security techniques based on EPC gen2 tag for secure mobile RFID network servicesProceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I10.1007/11892960_111(924-934)Online publication date: 9-Oct-2006
  • (2006)An RFID system based MCLT system with improved privacyProceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing10.1007/11807964_59(579-590)Online publication date: 1-Aug-2006

Index Terms

  1. RFID system with fairness within the framework of security and privacy
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        ESAS'05: Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
        July 2005
        218 pages
        ISBN:3540309128
        • Editors:
        • Refik Molva,
        • Gene Tsudik,
        • Dirk Westhoff

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 13 July 2005

        Author Tags

        1. RFID
        2. fairness
        3. privacy
        4. security
        5. traceability
        6. uncheckable

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 26 Sep 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2006)Efficient RFID authentication protocol for minimizing RFID tag computationProceedings of the 1st international conference on Advances in hybrid information technology10.5555/1782654.1782719(607-616)Online publication date: 9-Nov-2006
        • (2006)Security techniques based on EPC gen2 tag for secure mobile RFID network servicesProceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I10.1007/11892960_111(924-934)Online publication date: 9-Oct-2006
        • (2006)An RFID system based MCLT system with improved privacyProceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing10.1007/11807964_59(579-590)Online publication date: 1-Aug-2006

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media