• Integration i.e. it can be difficult to visually ascer-
tain the presence of a tag.
• Retrieve information, other than identification,
carried by, or linked to, RFID tags.
It is always a better choice to not keep sensitive in-
formation on devices as tags if it possible to do dif-
ferently. But even if there is no other sensitive infor-
mation than an identifier on the tag, this is enough
to be a real concern. Covert tracking for tags carried
by human people threaten their privacy enabling their
localization and the tracking of their activities. More-
over, a tag may reveal the users’ membership to their
organization which delivered their tags. A set of tags
may represent multiple memberships and constitute a
personal profile, e.g. identifying a person as being
customer of some transport companies, of media and
clothes stores, etc.
2.2 Our Privacy Concerns
We are concerned with an RFID system which can
operate with many parts of the information system,
as opposed to closed applications like access building
software which could be, for most of them, isolated
from the rest of the information system. The obvi-
ous primary question is ‘who represent the threat?’.
Attack from the outside would mean that somebody
want to track one of our member, or maybe, if it
knows his real identity, link it with a tag identifier.
So he wants to make one of our tag to leak its iden-
tifier. This means two requirements, our tags should
not respond to readers other than ours, and, to pre-
vent eavesdropping, the tag identifier should not be
revealed in clear. Readers authentication by tags and
anonymous communication, hidding the tag identi-
fier, between tags and readers is the ideal. But for
know it is not the common case. We thus make here a
study when tags have no such capabilities. Hence we
have to take in account the leakings of the commu-
nications between tags and readers. We have also to
take care of attacks against RFID information in the
rest of the information system. This means to monitor
carefully the RFID backend mapping tag identifiers
and user identifiers. And also, the communications
and applications logging records which could allow
to link the real identity with a tag identifier as well.
2.3 RFID Cryptographic Protocols
We should be able to encrypt and authenticate the
communication between the tags and the readers with
cryptographic protocols (Lee et al., 2006; Song and
Mitchell, 2008). A public key infrastructure with an
authority certificate embedded in tags, and readers
broadcasting their certificate seems relevant. How-
ever, most of the RFID tags have limited computation
capabilities which, for now, prevent from spreading
asymmetric cryptography in the RFID domain. More-
over, it requires to implement mechanisms which au-
thenticate without compromising anonymity, i.e re-
vealing the tag identifier, which, with symmetric
cryptography, could be resume to the key search is-
sue(Juels, 2006). Finally, the tag identifier should not
be a single static data string. In cryptographic scheme
as the Song’s one (Song and Mitchell, 2008), the tag
identifier changes at each authentication.
3 FOCUS ON THE DISTRIBUTED
APPLICATION
We here rely on a use case which is the deployment
of a trivial application of agenda consultation. This
application consists in a fast and easy way to inform
people of their agendas and updates, thus making the
people inner-organization life easier and lightening
some of the administrative tasks of the bureau. Users
are provided with RFID tags allowing them to trig-
ger the display of their agendas with the help of a
RFID reader standing close to a large screen. We have
chosen a simple application to focus on the privacy
concerns implied by the RFID system, and not on ac-
cess control questions. Our members and their mul-
tiple group memberships (section, language, options,
etc...) are all registered in a central identity registry
(henceforth idregistry). Their agendas are registered
in a database (henceforth agendadb), and only depend
on group memberships, not on their own identity, per-
sonal agenda are not concerned by this application.
Moreover, the agendas are already publicly available
for insiders. Hence, we consider that the service of
displaying agenda is not a privacy threat by itself.
3.1 Overview of the Use Case
As a matter of fact, the main privacy threat comes
from the identity mapping, i.e. the association of a
RFID tag and a person. As a consequence, we have to
take care of:
• User identifiable information written on tags;
• Records in the information system linking tags
identifiers with users identifiers;
• Communications linking tag’s tid with user’s id.
We can however deduce from the agenda depending
only to group memberships, that a tag identifier has
only to be linked to a set of groups, not to a user. The
PRIVACY FOR RFID-ENABLED DISTRIBUTED APPLICATIONS - Design Notes
325