Localization Privacy

Location-aware technology and its applications are fundamental to ubiquitous computing. Essential to this technology is object localization and identification. RFID (radio frequency identification) technology has been shown to be very effective for identification and tracking applications in industry, transport, agriculture and health-care. However it can also be used for accurate object localization. Indeed RFID technology is ideally suited for such applications, and more generally for context-aware computing, because of the low cost, low power, light weight and endurance of RFID tags. In this article we study the security of RFID localization.

[1]  A. S. Krishnakumar,et al.  Bayesian indoor positioning systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  Stanisław Lem His Master's Voice , 1968 .

[3]  Miklós Maróti,et al.  Radio interferometric geolocation , 2005, SenSys '05.

[4]  Xiuwen Liu,et al.  Accurate localization of RFID tags using phase difference , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).

[5]  Yunhao Liu,et al.  VIRE: Active RFID-based Localization Using Virtual Reference Elimination , 2007, 2007 International Conference on Parallel Processing (ICPP 2007).

[6]  Jan Camenisch,et al.  Untraceable RFID tags via insubvertible encryption , 2005, CCS '05.

[7]  S. Coco,et al.  A novel 2-D ray tracing procedure for the localization of EM field sources in urban environment , 2004, IEEE Transactions on Magnetics.

[8]  Wolfram Burgard,et al.  Modeling RFID signal strength and tag detection for localization and mapping , 2009, 2009 IEEE International Conference on Robotics and Automation.

[9]  Tassos Dimitriou,et al.  A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[10]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[11]  Aggelos Kiayias,et al.  Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.

[12]  S.A. Weis RFID privacy workshop , 2004, IEEE Security & Privacy Magazine.

[13]  P.V. Nikitin,et al.  An Overview of Near Field UHF RFID , 2007, 2007 IEEE International Conference on RFID.

[14]  Mike Burmester His Late Master's Voice: Barking for Location Privacy , 2011, Security Protocols Workshop.

[15]  Mauro Brunato,et al.  Statistical learning theory for location fingerprinting in wireless LANs , 2005, Comput. Networks.

[16]  Ingrid Verbauwhede,et al.  Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware , 2010, Towards Hardware-Intrinsic Security.

[17]  Yunhao Liu,et al.  LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[18]  Polly Huang,et al.  Spinning beacons for precise indoor localization , 2008, SenSys '08.

[19]  Zhang Xiong,et al.  An Improved RFID-Based Locating Algorithm by Eliminating Diversity of Active Tags for Indoor Environment , 2009, Comput. J..

[20]  George Danezis,et al.  How Much Is Location Privacy Worth? , 2005, WEIS.

[21]  Mike Burmester,et al.  Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols , 2006, 2006 Securecomm and Workshops.

[22]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[23]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[24]  Cesare Alippi,et al.  A statistical approach to localize passive RFIDs , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[25]  Brian W. Kernighan,et al.  WISE design of indoor wireless systems: practical computation and optimization , 1995 .

[26]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[27]  A. Kleiner,et al.  Mapping disaster areas jointly: RFID-Coordinated SLAM by Hurnans and Robots , 2007, 2007 IEEE International Workshop on Safety, Security and Rescue Robotics.

[28]  Ling Liu,et al.  From Data Privacy to Location Privacy: Models and Algorithms , 2007, VLDB.

[29]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[30]  Mike Burmester,et al.  The Security of EPC Gen2 Compliant RFID Protocols , 2008, ACNS.

[31]  Bruno Sinopoli,et al.  A kernel-based learning approach to ad hoc sensor network localization , 2005, TOSN.

[32]  Peter Volgyesi,et al.  Towards Precise Indoor RF Localization , 2008 .

[33]  Ákos Lédeczi,et al.  Radio interferometric tracking of mobile wireless nodes , 2007, MobiSys '07.

[34]  Jing Shi,et al.  RFID localization algorithms and applications—a review , 2009, J. Intell. Manuf..

[35]  R. Weigel,et al.  Ultra low power oscillator for UHF RFID transponder , 2008, 2008 IEEE International Frequency Control Symposium.

[36]  Kaoru Kurosawa,et al.  OMAC: One-Key CBC MAC , 2003, IACR Cryptol. ePrint Arch..

[37]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[38]  Binghao Li,et al.  Use of Directional Information in Wireless LAN based indoor positioning , 2007 .

[39]  Andrew G. Dempster,et al.  Direction-based Wireless LAN Positioning , 2007 .

[40]  Xenofon D. Koutsoukos,et al.  Using RF received phase for indoor tracking , 2010, HotEmNets.

[41]  James Poirot,et al.  Navigation by Back Triangulation , 1976, IEEE Transactions on Aerospace and Electronic Systems.

[42]  David A. Wagner,et al.  A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..

[43]  Wolfram Burgard,et al.  Mapping and localization with RFID technology , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.

[44]  Gergely V. Záruba,et al.  A Bayesian sampling approach to in-door localization of wireless devices using received signal strength indication , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[45]  Xenofon D. Koutsoukos,et al.  Tracking mobile nodes using RF Doppler shifts , 2007, SenSys '07.

[46]  Abdelhamid Tayebi,et al.  THE APPLICATION OF RAY-TRACING TO MOBILE LOCALIZATION USING THE DIRECTION OF ARRIVAL AND RECEIVED SIGNAL STRENGTH IN MULTIPATH INDOOR ENVIRONMENTS , 2009 .

[47]  Moustafa Youssef,et al.  The Horus WLAN location determination system , 2005, MobiSys '05.

[48]  Mike Burmester,et al.  Universally composable and forward-secure RFID authentication and authenticated key exchange , 2007, ASIACCS '07.

[49]  Gerhard Goos,et al.  Fast Software Encryption , 2001, Lecture Notes in Computer Science.