Skip to main content

Privacy Protection for RFID with Hidden Subset Identifiers

  • Conference paper
Pervasive Computing (Pervasive 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5013))

Included in the following conference series:

Abstract

We propose very simple and cheap but nevertheless effective protection against privacy threats for RFID-tags. For the hidden subset RFID-tags proposed in this paper, the ID string presented by an RFID-tag evolves rapidly. It is is not the bit value that enables one to recognize a tag. Instead, a reader detects some invariant properties that are hard to be recognized by a curious illegitimate reader.

The solution is not based on any cryptographic primitive, it relies only on properties of random sets and on linear mappings between vector spaces. The solution proposed is well suited for low-end devices, since all mechanisms can be easily implemented by circuits of a small size.

This work was partially supported by EU within the 7th Framework Programme under contract 215270 (FRONTS). It was initiated within the 6th Framework Programme under contract 001907 (DELIS). Marek Klonowski was beneficiary of domestic grant for young scientists awarded by The Foundation for Polish Science in the years 2006-2007.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Camenisch, J., de Medeiros, B.: Untracable RFID Tags via Insubvertible Encryption. In: 12th ACM CCS 2005, pp. 92–101. ACM Press, New York (2005)

    Google Scholar 

  2. Blömer, J., Karp, R., Welzl, E.: The Rank of Sparse Random Matrices over Finite Fields. Random Structures and Algorithms 10(4), 407–419 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  3. Cichoń, J., Klonowski, M., Kutyłowski, M.: Privacy Protection in Dynamic Systems Based on RFID Tags. In: 4th IEEE International Workshop on Pervasive Computing and Communication Security, Proceedings of PERCOM 2007 Workshops, pp. 235–240. IEEE Computer Society, Los Alamitos (2007)

    Google Scholar 

  4. Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal Re-encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Juels, A.: Yoking-Proofs for RFID Tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, p. 138. IEEE Computer Society Press, Los Alamitos (2004)

    Chapter  Google Scholar 

  6. Juels, A.: RFID privacy: A Technical Primer for the Non-Technical Reader. In: Privacy and Technologies of Identity: A Cross-Disciplinary Conversation, Springer, Heidelberg (2005), available from: www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/rfid_privacy/DePaul23Feb05Draft.pdf

    Google Scholar 

  7. Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy 3(3), 34–43 (2005)

    Article  Google Scholar 

  8. Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM CCS 2003, pp. 103–111. ACM Press, New York (2003)

    Google Scholar 

  9. Molnar, D., Wagner, D.: Privacy and Security in Library RFID Issues, Practices and Architectures. In: 11th ACM CCS 2004, pp. 210–219. ACM Press, New York (2004)

    Google Scholar 

  10. Moskowitz, P.A., Lauris, A., Morris, S.S.: A Privacy Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag. In: PerTec 2007, Proceedings of PERCOM 2007 Workshops, pp. 348–351. IEEE Computer Society Press, Los Alamitos (2007)

    Google Scholar 

  11. Langheinrich, M.: A Survey of RFID Privacy Approaches. In: Workshop on Ubicomp Privacy - Technologies, Users, Policy. Workshop at Ubicomp 2007 (2007), available from: www.vs.inf.ethz.ch/publ/papers/langhein2007-ubipriv.pdf

  12. Langheinrich, M.: RFID and Privacy. In: Security, Privacy, and Trust in Modern Data Management, Springer, Heidelberg (2007)

    Google Scholar 

  13. Rivest, R.L.: Chaffing and Winnowing: Confidentiality without Encryption, https://people.csail.mit.edu/rivest/chaffing.txt

  14. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jadwiga Indulska Donald J. Patterson Tom Rodden Max Ott

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cichoń, J., Klonowski, M., Kutyłowski, M. (2008). Privacy Protection for RFID with Hidden Subset Identifiers. In: Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds) Pervasive Computing. Pervasive 2008. Lecture Notes in Computer Science, vol 5013. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79576-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-79576-6_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-79575-9

  • Online ISBN: 978-3-540-79576-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics