Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7122))

Abstract

Privacy in RFID systems is a fruitful research field that emerged a few years ago only, and that is today covered by several hundred scientific publications. This short paper relates the content of the invited talk given by Gildas Avoine on the privacy challenges in RFID. It explains why privacy is an important matter but it also investigates whether the current researches appropriately answer to the real problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Avoine, G.: RFID Security & Privacy Lounge, http://www.avoine.net/rfid/

  2. Avoine, G.: Adversary Model for Radio Frequency Identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology, EPFL (2005)

    Google Scholar 

  3. Avoine, G., Kalach, K., Quisquater, J.-J.: ePassport: Securing International Contacts with Contactless Chips. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 141–155. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Avoine, G., Martin, T., Szikora, J.-P.: Lire son passe navigo en un clin d’œil. Multi-System & Internet Security Cookbook – MISC 48 (March-April 2010)

    Google Scholar 

  5. Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Calypso Networks Association, http://www.calypsonet-asso.org/

  7. Canard, S., Coisel, I., Etrog, J., Girault, M.: Privacy-Preserving RFID Systems: Model and Constructions. Cryptology ePrint Archive, Report 2010/405 (2010)

    Google Scholar 

  8. Cavioukan, A.: Privacy guidelines for RFID information systems (2006)

    Google Scholar 

  9. Chatmon, C., van Le, T., Burmester, M.: Secure Anonymous RFID Authentication Protocols. Technical Report TR-060112, Florida State University (2006)

    Google Scholar 

  10. Common Criteria, http://www.commoncriteriaportal.org/

  11. ICO. Information commissionner’s office, http://www.ico.gov.uk/

  12. Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: ACM CCS 2003, pp. 103–111. ACM Press (2003)

    Google Scholar 

  13. Juels, A., Weis, S.: Defining Strong Privacy for RFID. In: PerCom 2007, pp. 342–347 (2007)

    Google Scholar 

  14. MITRE. Making security measurable, http://measurablesecurity.mitre.org/

  15. Reding, V.: Commission recommendation of 12.05.2009 - sec(2009) 585/586, on the implementation of privacy and data protection principles in applications supported by radio-frequency identification (2009)

    Google Scholar 

  16. Richardson, R.: 15th annual 2010/2011 computer crime and security survey. Technical report, Computer Security Institute (2011)

    Google Scholar 

  17. Simitian, J.: CA Senate Bill No. 682 (2005), http://leginfo.public.ca.gov

  18. van Deursen, T., Mauw, S., Radomirović, S.: Untraceability of RFID Protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol. 5019, pp. 1–15. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  19. Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Avoine, G. (2012). Privacy Challenges in RFID. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28879-1_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28878-4

  • Online ISBN: 978-3-642-28879-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics