Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to every- day consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy of individuals or organizations. This paper presents a brief description of RFID systems and their operation. We describe privacy and security risks and how they apply to the unique setting of low-cost RFID devices. We propose several security mech- anisms and suggest areas for future research.

[1]  Martín Abadi,et al.  Authentication and Delegation with Smart-cards , 1991, TACS.

[2]  Michael Luby,et al.  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.

[3]  Markus G. Kuhn,et al.  Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.

[4]  Ran Canetti,et al.  Perfectly one-way probabilistic hash functions (preliminary version) , 1998, STOC '98.

[5]  Sean W. Smith,et al.  Smart cards in hostile environments , 1996 .

[6]  Steve H. Weingart Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.

[7]  Richard J. Lipton,et al.  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.

[8]  Benny Bing Broadband Wireless Access , 2000 .

[9]  Oded Goldreich,et al.  Foundations of Cryptography: List of Figures , 2001 .

[10]  Stefan Lucks,et al.  On the Minimal Hardware Complexity of Pseudorandom Function Generators , 2001, STACS.

[11]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[12]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[13]  Ran Canetti,et al.  Perfectly One-Way Probabilistic Hash Functions , 1998, Symposium on the Theory of Computing.

[14]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[15]  Oded Goldreich Foundations of Cryptography: Index , 2001 .

[16]  Suresh Chari,et al.  A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .

[17]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[18]  中村 修,et al.  20世紀の名著名論:Robert M. Metcalfe and David R. Boggs : Ethernet : Distributed Packet Switching for Local Computer Networks , 2003 .

[19]  Gordon Bell,et al.  Ethernet: Distributed Packet Switching for Local Computer Networks , 1976 .

[20]  Roger M. Needham,et al.  TEA, a Tiny Encryption Algorithm , 1994, FSE.

[21]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[22]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[23]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.

[24]  Paul C. Kocher Cryptanalysis of Di e-Hellman, RSA, DSS, and Other Systems Using Timing Attacks , 1999 .