customer privacy across the system components and
to identify the generic privacy threats. The resultant
privacy threats classification, therefore, forms a sound
basis for countermeasures development to protect the
customer privacy in real systems. We provide the dis-
cussion of possible countermeasures together with the
way of countermeasures refinement (elaboration) and
their integration into a final privacy-preserving solu-
tion.
Having specified the framework for develop-
ing privacy-respecting e-ticketing systems for public
transportation, we are going to actively use it in future
for the development of our privacy-respecting solu-
tion for such systems. It is still unclear, however, if
all of the identified privacy threats can be effectively
considered within a real system and what the possible
trade-offs are, which is left for the future work.
ACKNOWLEDGEMENTS
This work has been funded by the Free State of Sax-
ony and the European Social Fund (ESF). The author
would like to express his gratitude to the colleagues
of Chair of Privacy and Data Security, TU Dresden,
for fruitful discussions and their support.
REFERENCES
Bartels, C. et al. (2009). TR 03126 - Technische
Richtlinie fr den sicheren RFID-Einsatz. TR 03126-
1: Einsatzgebiet “eTicketing im ffentlichen Personen-
verkehr”. BSI, Deutschland.
Batina, L., , et al. (2010). Developing Efficient Blinded
Attribute Certificates on Smart Cards via Pairings. In
Gollmann, D. et al., editors, Smart Card Research and
Advanced Application, volume 6035 of Lecture Notes
in Computer Science, pages 209–222. Springer Berlin
Heidelberg.
Choi, W. and Roh, B.-h. (2006). Backward Channel Pro-
tection Method for RFID Security Schemes Based on
Tree-Walking Algorithms. In Gavrilova, M. et al., ed-
itors, Computational Science and Its Applications -
ICCSA 2006, volume 3983 of Lecture Notes in Com-
puter Science, pages 279–287. Springer Berlin / Hei-
delberg.
de Chantrac, G. and Graindorge, J.-L. (2009). Fo-
cus Paper on Privacy in Transport IFM Appli-
cations. IFM Project, http://www.ifm-project.eu/
fileadmin/WP2/Draft Deliverable 2.2.pdf. Draft De-
liverable 2.2.
Gudymenko, I. (2011). Protection of the Users Privacy in
Ubiquitous RFID Systems. Masters thesis, Technische
Universitt Dresden, Faculty of Computer Science.
Heydt-Benjamin, T. et al. (2006). Privacy for Public Trans-
portation. In Danezis, G. and Golle, P., editors, Pri-
vacy Enhancing Technologies, volume 4258 of Lec-
ture Notes in Computer Science, pages 119. Springer
Berlin Heidelberg.
Hoepman, J.-H. et al. (2010). Privacy and Security Is-
sues in e-Ticketing Optimisation of Smart Card-based
Attribute-proving. In Cortier, V. et al., editors, Work-
shop on Foundations of Security and Privacy, FC-
SPrivMod 2010.
ISO (2008-2011). ISO 14443 Standards family. Identifica-
tion cards Contactless integrated circuit cards Prox-
imity cards.
Juels, A. and Pappu, R. (2002). Squealing Euros: Privacy
Protection in RFID-Enabled Banknotes. In Financial
Cryptography 03, pages 103–121. Springer-Verlag.
Land Transport Authority (2012). EZ-Link. http://
www.ezlink.com.sg/index.php. Accessed on
30.10.2012.
Lim, T.-L. et al. (2008a). A Cross-layer Framework for Pri-
vacy Enhancement in RFID systems. Pervasive and
Mobile Computing, 4(6):889–905.
Lim, T.-L. et al. (2008b). Randomized Bit Encoding
for Stronger Backward Channel Protection in RFID
Systems. In Proceedings of the 2008 Sixth Annual
IEEE International Conference on Pervasive Comput-
ing and Communications, PERCOM 08, pages 40–49,
Washington, DC, USA. IEEE Computer Society.
Octopus Cards Limited (2012). Octopus. http://
www.octopus.com.hk/home/en/index.html. Accessed
on 30.10.2012.
Pfitzmann, A. (1999). Multilateral Security in Communica-
tions, chapter Technologies for Multilateral Security,
pages 85–91. Addison-Wesley-Longman.
Rannenberg, K. (2000). Multilateral Security A Concept
And Examples for Balanced Security. In Proceedings
of the 2000 workshop on New Security Paradigms,
NSPW 00, pages 151–162, New York, NY, USA.
ACM.
Sadeghi, A.-R. et al. (2008). User Privacy in Transport Sys-
tems Based on RFID E-Tickets. In Bettini, C. et al.,
editors, Proceedings of the 1st InternationalWorkshop
on Privacy in Location-Based Applications (PiLBA),
Malaga, Spain.
Trans Link Systems (2012). OV-Chipkaart. http://
www.ov-chipkaart.nl/. Accessed on 30.10.2012.
Transport for London (2012). Oyster Online. https://
oyster.tfl.gov.uk/oyster/entry.do. Accessed on
30.10.2012.
Weiser, M. (1991). The Computer for the 21st Century. Sci-
entific American Special Issue on Communications,
Computers, and Networks.
Zanetti et al. (2011). On the Practicality of UHF RFID Fin-
gerprinting: How Real is the RFID Tracking Prob-
lem? In Fischer-Hubner, S. and Hopper, N., edi-
tors, Privacy Enhancing Technologies, volume 6794
of Lecture Notes in Computer Science, pages 97–116.
Springer Berlin / Heidelberg.
OnProtectionoftheUser'sPrivacyinUbiquitousE-ticketingSystemsbasedonRFIDandNFCTechnologies
91