Advertisement

Abstract

Many security and privacy protocols for RFID systems have been proposed [7] [12] [6] [11]. In most cases these protocols are evaluated in terms of security based on some model. Here we describe several of the security requirements that are needed in an RFID system and model these requirements. They include privacy of tag data, privacy of ownership, integrity of tag data, and availability of tag identity. We also construct less restrictive versions of many of these models to reflect the security needed for some less security-intensive RFID applications and compare them to existing models.

Keywords

Security Requirement Security Service Security Model Environmental Channel Authorized Reader 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    860MHzC930MHz Class I Radio Frequency Identification Tag: radio frequency and logical communication interface specification. Technical report, Auto-ID Center (2002)Google Scholar
  2. 2.
    Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: The 2nd IEEE International Workshop on Pervasive Computing and Communication Security – PerSec 2005, Kauai Island, Hawaii, USA, IEEE Computer Society Press, Los Alamitos (2005) (to appear)Google Scholar
  3. 3.
    Avoine, G.: Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005/098 (2005), http://eprint.iacr.org/
  4. 4.
    Engberg, S., Harning, M., Damsgaard Jensen, C.: Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience. In: The Second Annual Conference on Privacy, Security and Trust – PST, New Brunswick, Canada (2004)Google Scholar
  5. 5.
    Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Feldhofer, M.: A proposal for authentication protocol in a security layer for RFID smart tags (2003)Google Scholar
  7. 7.
    Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149–164. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Juels, A.: Strengthening EPC tags against cloning. Manuscript (2004)Google Scholar
  9. 9.
    Juels, A., Pappu, R.: Squealing euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM conference on Computer and communication security, pp. 103–111. ACM Press, New York (2003)CrossRefGoogle Scholar
  11. 11.
    Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Pfitzmann, B., Liu, P. (eds.) Conference on Computer and Communications Security – ACM CCS, Washington, DC, USA, pp. 210–219. ACM, ACM Press, New York (2004)Google Scholar
  12. 12.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop, MIT, MA (2003)Google Scholar
  13. 13.
    Ranasinghe, D., Engels, D., Cole, P.: Low-cost RFID systems: Confronting security and privacy. In: Auto-ID Labs Research Workshop, Zurich, Switzerland (2004)Google Scholar
  14. 14.
    Sarma, S.E., Engels, D.W.: On the future of RFID tags and protocols. Technical Report MIT-AUTOID-TR-018, AUTO-ID Center (2003)Google Scholar
  15. 15.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–470. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  16. 16.
    Sutton, G.D.: Radio frequency identification - basics for manufacturing (1993)Google Scholar
  17. 17.
    Yoshida, J.: Euro bank notes to embed RFID chips by 2005. EE Times (2001)Google Scholar
  18. 18.
    Zhang, X., King, B.: Integrity improvements to an RFID privacy protection protocol for anti-counterfeiting. In: Information Security Conference, Singapore, pp. 474–481 (2005)Google Scholar
  19. 19.
    Zhang, X., King, B.: “Modeling RFID security (extended version)”, http://www.engr.iupui.edu/~briking/papers/model.pdf

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Xiaolan Zhang
    • 1
  • Brian King
    • 2
  1. 1.University of Illinois 
  2. 2.Indiana Univ. Purdue Univ at Indianapolis 

Personalised recommendations