The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2009 vol.7)
pp: 56-62
Sarah Spiekermann , Humboldt University, Berlin
Sergei Evdokimov , Humboldt University, Berlin
ABSTRACT
RFID technology can help automatically and remotely identify objects, which raises many security concerns. The authors review and categorize several RFID security and privacy solutions, and conclude that the most promising and low-cost approach currently attracts little academic attention.
INDEX TERMS
RFID, privacy, security, authentication
CITATION
Sarah Spiekermann, Sergei Evdokimov, "Critical RFID Privacy-Enhancing Technologies", IEEE Security & Privacy, vol.7, no. 2, pp. 56-62, March/April 2009, doi:10.1109/MSP.2009.31
REFERENCES
1. S. Spiekermann, User Control in Ubiquitous Computing: Design Alternatives and User Acceptance, Shaker Verlag, 2008.
2. P.A. Moskowitz, A. Lauris, and S. Morris, "A Privacy-Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag," Proc. 5th IEEE Int'l Conf. Pervasive Computing and Comm. Workshops, IEEE CS Press, 2007, pp. 348–351.
3. M.R. Rieback et al., "A Platform for RFID Security and Privacy Administration," Proc. 20th Large Installation System Administration Conf., Advanced Computing Systems Assoc., 2006, pp. 92–98.
4. D. Engels et al., "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Proc. 1st Int'l Conf. Security in Pervasive Computing, Springer Verlag, 2003, pp. 201–212.
5. M. Lehtonen et al., "From Identification to Authentication—A Review of RFID Product Authentication Techniques," Proc. Workshop on RFID Security, Springer Verlag, 2006, pp. 169–187.
6. C. Floerkemeier, R. Schneider, and M. Langheinrich, Scanning with a Purpose—Supporting the Fair Information Principles in RFID Protocols in Ubiquitous Computing Systems, H. Murakami et al., eds., Springer Verlag, 2004.
7. A. Juels, R. Rivest, and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy," Proc. 10th ACM Conf. Computers and Comm. Security, ACM Press, 2003, pp. 103–111.
8. A. Juels, P. Syverson, and D. Bailey, "High-Power Proxies for Enhancing RFID Privacy and Utility," Proc. 5th Int'l Workshop on Privacy Enhancing Technologies, Springer, 2005, pp. 210–226.
9. M.R. Rieback, B. Crispo, and A. Tanenbaum, "Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags," Proc. 13th Security Protocol Int'l Workshop, Springer Verlag, 2005, pp. 51–59.
10. L.F. Cranor et al., "The Platform for Privacy Preferences 1.1 (P3P1.1) Specification," W3C Working Group note, 13 Nov. 2006; www.w3.org/TRP3P11/.
11. S. Engberg, M. Harning, and C. Damsgaard Jensen, "Zero-Knowledge Device Authentication: Privacy and Security Enhanced RFID Preserving Business Value and Consumer Convenience," Proc. 2nd Ann. Conf. Privacy, Security, and Trust, RFIDsec, 2004; www.rfidsec.com/docsPST2004_RFID_ed.pdf.
12. S. Spiekermann and O. Berthold, "Maintaining Privacy in RFID-Enabled Environments—Proposal for a Disable-Model," Privacy, Security and Trust within the Context of Pervasive Computing, P. Robinson, H. Vogt, and W. Wagealla eds., Springer Verlag, 2004, pp. 137–146.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool