Abstract
Privacy in RFID systems is a fruitful research field that emerged a few years ago only, and that is today covered by several hundred scientific publications. This short paper relates the content of the invited talk given by Gildas Avoine on the privacy challenges in RFID. It explains why privacy is an important matter but it also investigates whether the current researches appropriately answer to the real problem.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Avoine, G.: RFID Security & Privacy Lounge, http://www.avoine.net/rfid/
Avoine, G.: Adversary Model for Radio Frequency Identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology, EPFL (2005)
Avoine, G., Kalach, K., Quisquater, J.-J.: ePassport: Securing International Contacts with Contactless Chips. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 141–155. Springer, Heidelberg (2008)
Avoine, G., Martin, T., Szikora, J.-P.: Lire son passe navigo en un clin d’œil. Multi-System & Internet Security Cookbook – MISC 48 (March-April 2010)
Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)
Calypso Networks Association, http://www.calypsonet-asso.org/
Canard, S., Coisel, I., Etrog, J., Girault, M.: Privacy-Preserving RFID Systems: Model and Constructions. Cryptology ePrint Archive, Report 2010/405 (2010)
Cavioukan, A.: Privacy guidelines for RFID information systems (2006)
Chatmon, C., van Le, T., Burmester, M.: Secure Anonymous RFID Authentication Protocols. Technical Report TR-060112, Florida State University (2006)
Common Criteria, http://www.commoncriteriaportal.org/
ICO. Information commissionner’s office, http://www.ico.gov.uk/
Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: ACM CCS 2003, pp. 103–111. ACM Press (2003)
Juels, A., Weis, S.: Defining Strong Privacy for RFID. In: PerCom 2007, pp. 342–347 (2007)
MITRE. Making security measurable, http://measurablesecurity.mitre.org/
Reding, V.: Commission recommendation of 12.05.2009 - sec(2009) 585/586, on the implementation of privacy and data protection principles in applications supported by radio-frequency identification (2009)
Richardson, R.: 15th annual 2010/2011 computer crime and security survey. Technical report, Computer Security Institute (2011)
Simitian, J.: CA Senate Bill No. 682 (2005), http://leginfo.public.ca.gov
van Deursen, T., Mauw, S., Radomirović, S.: Untraceability of RFID Protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol. 5019, pp. 1–15. Springer, Heidelberg (2008)
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Avoine, G. (2012). Privacy Challenges in RFID. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-28879-1_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28878-4
Online ISBN: 978-3-642-28879-1
eBook Packages: Computer ScienceComputer Science (R0)