PRIVACY FOR RFID-ENABLED DISTRIBUTED APPLICATIONS - Design Notes

Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jeremy Lardon, Rahul Garg

Abstract

The concern of this paper is RFID systems coupled with distributed applications. We do not treat known RFID attacks, we rather focus on the best way to protect the identity mapping, i.e. the association of a tag identifier, which can be obtained or deduced from the tags or communications including the tags, and the real identity of its carrier. We rely on a common use case of a distributed application and a modelling approach.

References

  1. Finkenzeller, K. (2003). RFID Handbook: Fundamentals and Applications in Contactless smartcards and Identification, 2nd edt. John Wiley and Sons.
  2. Glover, B. and Bhatt, H. (2006). RFID Essentials. O'Reilly.
  3. Juels, A. (2006). Rfid security and privacy: A research survey. IEEE Journal on Selected Areas in Communication.
  4. Langheinrich, M. (2007). Privacy and rfid. In Security, Privacy, and Trust in Modern Data Management, pages 433-450. Springer.
  5. Lee, H., Yang, J., and Kim, K. (2006). Enhanced mutual authentication protocol for low-cost rfid. Technical report, Auto-ID Labs.
  6. Pfitmann, A. and Kohntopp, M. (2001). Anonymity, unobservability, and pseudonymity - a proposal for terminology. In Lecture Notes in Computer Science: Designing Privacy Enhancing Technologies, volume 2009, pages 1-9. Springer Berlin / Heidelberg.
  7. Song, B. and Mitchell, C. J. (2008). Rfid authentication protocol for low-cost tags. In WiSec'08: Proceedings of the 2008 ACM Conference of Wireless Security. ACM.
  8. Westin, A. F. (1967). Privacy and freedom. Atheneum Publishers.
Download


Paper Citation


in Harvard Style

Ates M., Fayolle J., Gravier C., Lardon J. and Garg R. (2009). PRIVACY FOR RFID-ENABLED DISTRIBUTED APPLICATIONS - Design Notes . In Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8111-86-9, pages 324-328. DOI: 10.5220/0001862003240328


in Bibtex Style

@conference{iceis09,
author={Mikaël Ates and Jacques Fayolle and Christophe Gravier and Jeremy Lardon and Rahul Garg},
title={PRIVACY FOR RFID-ENABLED DISTRIBUTED APPLICATIONS - Design Notes},
booktitle={Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2009},
pages={324-328},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001862003240328},
isbn={978-989-8111-86-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - PRIVACY FOR RFID-ENABLED DISTRIBUTED APPLICATIONS - Design Notes
SN - 978-989-8111-86-9
AU - Ates M.
AU - Fayolle J.
AU - Gravier C.
AU - Lardon J.
AU - Garg R.
PY - 2009
SP - 324
EP - 328
DO - 10.5220/0001862003240328