A Trajectory Privacy Model for Radio-Frequency Identification System

Here we propose a trajectory privacy model to solve privacy and security problems with radio-frequency identification (RFID) systems. The model first formalizes an Adversary Model and then defines an adversary indistinguishability privacy game and interval security privacy game according to the ability of the adversary. Based on the privacy game between adversary and challenger, the author gives the definition of weak trajectory privacy and strong trajectory privacy. Finally, we analyzed the privacy protection level of present RFID systems with the help of this trajectory privacy model. It can be seen that the trajectory privacy model can effectively analyze and find the privacy vulnerabilities of RFID security protocols.

[1]  Ivan Damgård,et al.  RFID Security: Tradeoffs between Security and Efficiency , 2008, CT-RSA.

[2]  Ari Juels,et al.  Defining Strong Privacy for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[3]  Hai Liu,et al.  Spectral Deconvolution and Feature Extraction With Robust Adaptive Tikhonov Regularization , 2013, IEEE Transactions on Instrumentation and Measurement.

[4]  Jianwen Sun,et al.  Adaptive total variation-based spectral deconvolution with the split Bregman method. , 2014, Applied optics.

[5]  Basel Alomair,et al.  Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2010, IEEE Transactions on Parallel and Distributed Systems.

[6]  Serge Vaudenay,et al.  On Privacy Models for RFID , 2007, ASIACRYPT.

[7]  Frederik Vercauteren,et al.  A New RFID Privacy Model , 2011, ESORICS.

[8]  Hai Liu,et al.  A MAP-based algorithm for spectroscopic semi-blind deconvolution. , 2012, The Analyst.

[9]  Yunlei Zhao,et al.  A New Framework for RFID Privacy , 2010, ESORICS.

[10]  Serge Vaudenay,et al.  Mutual authentication in RFID: security and privacy , 2008, ASIACCS '08.

[11]  JaeCheol Ha,et al.  A New Formal Proof Model for RFID Location Privacy , 2008, ESORICS.

[12]  Robert H. Deng,et al.  RFID privacy: relation between two notions, minimal condition, and efficient construction , 2009, CCS.

[13]  Iwen Coisel,et al.  Untangling RFID Privacy Models , 2013, IACR Cryptol. ePrint Arch..

[14]  Robert H. Deng,et al.  Revisiting Unpredictability-Based RFID Privacy Models , 2010, ACNS.

[15]  Sanya Liu,et al.  Blind spectral deconvolution algorithm for Raman spectrum with Poisson noise , 2014 .

[16]  M. Ufuk Çaglayan,et al.  Extending an RFID Security and Privacy Model by Considering Forward Untraceability , 2010, STM.

[17]  Guomin Yang,et al.  A New Unpredictability-Based RFID Privacy Model , 2013, NSS.

[18]  Sjouke Mauw,et al.  Untraceability of RFID Protocols , 2008, WISTP.

[19]  Miyako Ohkubo,et al.  Relations among Notions of Privacy for RFID Authentication Protocols , 2012, ESORICS.

[20]  Hai Liu,et al.  Richardson–Lucy blind deconvolution of spectroscopic data with wavelet regularization , 2015 .

[21]  Tianxu Zhang,et al.  Multi-order blind deconvolution algorithm with adaptive Tikhonov regularization for infrared spectroscopic data , 2015 .