A survey of RFID privacy approaches

A bewildering number of proposals have offered solutions to the privacy problems inherent in RFID communication. This article tries to give an overview of the currently discussed approaches and their attributes.

[1]  Ari Juels,et al.  Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.

[2]  C. Castelluccia,et al.  Secret Shuffling: A Novel Approach to RFID Private Identification , 2007 .

[3]  Andrew S. Tanenbaum,et al.  The evolution of RFID security , 2006, IEEE Pervasive Computing.

[4]  Ari Juels,et al.  RFID PRIVACY : A TECHNICAL PRIMER FOR THE NON-TECHNICAL READER , 2005 .

[5]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[6]  Sozo Inoue,et al.  RFID Privacy Using User-Controllable Uniqueness , 2003 .

[7]  Günter Karjoth,et al.  Disabling RFID tags with visible confirmation: clipped tags are silenced , 2005, WPES '05.

[8]  Yunhao Liu,et al.  Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.

[9]  Andrew S. Tanenbaum,et al.  Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags , 2005, Security Protocols Workshop.

[10]  Sarah Spiekermann,et al.  Maintaining Privacy in RFID Enabled Environments , 2005 .

[11]  Marc Langheinrich RFID and Privacy , 2007, Security, Privacy, and Trust in Modern Data Management.

[12]  Sarah Spiekermann,et al.  Maintaining Privacy in Rfid Enabled Environments - Proposal for a Disable-Model , 2005 .

[13]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[14]  Milan Petkovic,et al.  Security, Privacy, and Trust in Modern Data Management , 2007, Data-Centric Systems and Applications.

[15]  Tassos Dimitriou,et al.  A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[16]  Simson L. Garfinkel,et al.  RFID: Applications, Security, and Privacy , 2005 .

[17]  KobsaAlfred,et al.  Privacy through pseudonymity in user-adaptive systems , 2003 .

[18]  Bryan Parno,et al.  Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.

[19]  Katherine J. Strandburg,et al.  Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .

[20]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[21]  Andrew S. Tanenbaum,et al.  RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.

[22]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[23]  Lejla Batina,et al.  RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.

[24]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[25]  Oliver Günther,et al.  RFID: Verbraucherängste und verbraucherschutz , 2005, Wirtsch..

[26]  David A. Wagner,et al.  A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..

[27]  坂倉 省吾,et al.  Technology Review : 抄録雑誌の概要 , 1987 .

[28]  Marc Langheinrich,et al.  Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols , 2004, UCS.

[29]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[30]  Gene Tsudik A Family of Dunces: Trivial RFID Identification and Authentication Protocols , 2007, Privacy Enhancing Technologies.

[31]  Sarah Spiekermann,et al.  RFID and privacy: what consumers really want and fear , 2009, Personal and Ubiquitous Computing.

[32]  Levente Buttyán,et al.  Optimal Key-Trees for Tree-Based Private Authentication , 2006, Privacy Enhancing Technologies.

[33]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[34]  Philippe Oechslin,et al.  Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.

[35]  Marc Langheinrich,et al.  Practical Minimalist Cryptography for RFID Privacy , 2007, IEEE Systems Journal.

[36]  Tim Kerins,et al.  An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..

[37]  Alfred Kobsa,et al.  Privacy through pseudonymity in user-adaptive systems , 2003, TOIT.

[38]  Frédéric Thiesse,et al.  Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.

[39]  David A. Wagner,et al.  Privacy for RFID through trusted computing , 2005, WPES '05.

[40]  Tsuyoshi Takagi,et al.  An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.

[41]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[42]  Ramakrishnan Srikant,et al.  Hippocratic Databases , 2002, VLDB.

[43]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[44]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[45]  Bing Jiang,et al.  Some Methods for Privacy in RFID Communication , 2004, ESAS.

[46]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[47]  Oliver Günther,et al.  Security Analysis of the Object Name Service , 2005 .

[48]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[49]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[50]  Dan Suciu,et al.  Physical Access Control for Captured RFID Data , 2007, IEEE Pervasive Computing.

[51]  Mikhail Nesterenko,et al.  RFID security without extensive cryptography , 2005, SASN '05.

[52]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[53]  Kevin Fu,et al.  Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.

[54]  Hannes Hartenstein,et al.  Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers , 2005, ESAS.

[55]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.