Skip to main content
  • 101 Accesses

Abstract

Recent proposals for widespread deployment of Radio Frequency Identification (RFID) systems have raised significant concerns about consumer privacy. With current low-cost tag technology, these concerns are somewhat unavoidable, as the tags aren’t designed to differentiate between authorized readers and unauthorized ones, and likewise the readers can’t directly distinguish between tags they’re allowed to identify and those they aren’t. Moreover, the privacy risks for consumers translate directly into the potential for industrial espionage in supply-chain implementations, undermining the competitive advantages that businesses aim to realize by deploying RFID systems in the first place. This article outlines some of the recent research results in RFID privacy that attempt to address these concerns without significantly impacting the cost of the tags.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dierks, T. and Allen, C: The TLS Protocol Version 1.0. IETF RFC 2246, January 1999. Available via http://www.rfc-editor.org/.

  2. Fishkin, K.P. and Roy, S.: Enhancing RFID Privacy via Antenna Energy Analysis. Presented at MIT RFID Privacy Workshop, November 2003. Also Intel Research Seattle Technical Memo IRS-TR-03-012, November 2003. Available via http://seattleweb.intel-research.net/people/fishkin/.

  3. Juels, A.: Minimalist Cryptography for RFID Tags. In submission, 2003. Available via http://www.ari-juels.com/.

  4. Juels, A. and Brainard, J.: Soft Blocking: Flexible Blocker Tags on the Cheap. Manuscript, 2003. Available via http://www.ari-juels.com/.

  5. Juels, A., Rivest, R.L., and Syzdlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In Atluri, V.: 8th ACM Conference on Computer and Communications Security, ACM Press, 2003, p. 103–111. Available via http://www.ari-juels.com/.

  6. Kaliski, B.: Security and Privacy in RFID Systems. Presented at RSA Conference Japan 2004. Available via http://www.rsasecurity.com/rsalabs/.

  7. Weis, S., Sarma, S.E., and Engels, D.W.: RFID Systems and Security and Privacy Implications. In Kaliski, B.: Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science Volume 2523, Springer, 2002, p. 454–470. Available via http://theory.lcs.mit.edu/~sweis/.

  8. Weis, S., Sarma, S.E., and Engels, D.W: Radio-Frequency Identification: Risks and Challenges. In: CryptoBytes, Volume 6, No. 1, Winter/Spring, 2003. Available via http://www.rsasecurity.com/rsalabs/cryptobytes/.

  9. Weis, S., Sarma, S.E., Rivest, R.L., and Engels, D.W: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Security in Pervasive Computing, Lecture Notes in Computer Science Volume 2802, Springer, 2003, p. 201–212. Available via http://theory.lcs.mit.edu/~sweis/.

    Article  Google Scholar 

  10. World Wide Web Consortium: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation, 16 April 2002. Available via http://www.w3.org/TR/P3P/.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Friedr. Vieweg & Sohn Verlagsgesellschaft/GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Kaliski, B. (2004). RFID Privacy: Challenges and Progress. In: ISSE 2004 — Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84984-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-84984-7_12

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05910-1

  • Online ISBN: 978-3-322-84984-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics