Skip to main content

Design Trade-Offs for Realistic Privacy

  • Chapter
RFID Security
  • 1801 Accesses

Abstract

The integration of RFID technology into consumer products raises serious privacy concerns, but no privacy protection scheme that can be implemented on passive RFID tags is readily available. Existing proposals either sacrifice a core property of RFID systems, such as availability or scalability, or offer only limited privacy. The most promising approaches appear to be tree-based hash protocols, which sacrifice some privacy to maintain scalability. The amount of information that is leaked by these tree-based protocols depends on the tree setup, as well as the number and position of disclosed secrets. This leaked information is valued differently by different attackers. Some attackers aim to collect most information from many tags to build customer profiles; some need detailed information from a representative subset of tags to derive turnover rates of goods while others need very detailed information on selected tags to track individuals. Modifications of the tree protocol can improve privacy but need to be evaluated under the applicable attacker model. In this chapter, we first introduce privacy issues in RFID systems and techniques for measuring achieved privacy. Then, we describe protocols designed to enhance privacy and evaluate their effectiveness against different types of attackers. We find that some measures such as pseudonyms and periodic key updates improve privacy against some attackers, while hurting privacy against other attackers. Some measures such as restructuring the tree improve privacy against all attackers but incur additional computational cost for the legitimate reader. To find the best privacy protocol for a known attacker all available trade-offs should be considered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wolkerstorfer, J. Is Elliptic-Curve Cryptography Suitable to Secure RFID Tags?. Workshop on RFID and Lightweight Crypto, 2005

    Google Scholar 

  2. Fabian, B., Guenther, O. and Spiekermann, S. Security Analysis of the Object Name Service for RFID. International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2005

    Google Scholar 

  3. Bauer, M., Fabian, B., Fischmann, M. and Gurses, S. Emerging Markets for RFID Traces. arXiv.org, 2006

    Google Scholar 

  4. Odlyzko, A. Privacy, Economics, and Price Discrimination on the Internet. International Conference on Electronic Commerce, 2003

    Google Scholar 

  5. Juels, A. RFID Security and Privacy: A research Survey. Manuscript, 2005

    Google Scholar 

  6. Juels, A. and Weis, S. Defining Strong Privacy for RFID. Cryptology ePrint Archive, 2006

    Google Scholar 

  7. Nohl, K. and Evans, D. Quantifying Information Leakage in Tree-Based Hash Protocols. Conference on Information and Communications Security, 2006

    Google Scholar 

  8. Weis, S., Sarma, S., Rivest, R. and Engels, D. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. International Conference on Security in Pervasive Computing, 2003

    Google Scholar 

  9. Ohkubo, M., Suzuki, K. and Kinoshita, S. Cryptographic Approach to “Privacy-Friendly” Tags. RFID Privacy Workshop, 2003

    Google Scholar 

  10. Zhai, J., Mok-Park, C. and Wang, G.-N. Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure. International Conference on Computational Science and its Applications, 2006

    Google Scholar 

  11. Rieback, M., Crispo, B. and Tanenbaum, A. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. Australasian Conference on Information Security and Privacy, 2005

    Google Scholar 

  12. Molnar, D. and Wagner, D. Privacy and Security in Library RFID: Issues, Practices, and Architectures. ACM CCS, 2004

    Google Scholar 

  13. Damgard, I. and Østergaard, M. RFID Security: Tradeoffs between Security and Efficiency. Cryptology ePrint Archive, 2006

    Google Scholar 

  14. Buttyan, L., Holczer, T. and Vajda, I. Optimal Key-Trees for Tree-Based Private Authentication. Workshop on Privacy Enhancing Technologies, 2006

    Google Scholar 

  15. Avoine, G. and Oechslin, P. RFID Traceability: A Multilayer Problem. Financial Cryptography, 2005

    Google Scholar 

  16. Nohara, Y., Inoue, S., Baba, K. and Yasuura, H. Quantitative Evaluation of Unlinkable ID atching Schemes. Workshop on Privacy in the Electronic Society, 2006

    Google Scholar 

  17. Cate, F. and Staten, M. The Value of Information-Sharing. Council of Better Business Bureau White Paper, 2000

    Google Scholar 

  18. Lim, C.H. and Kwon, T. Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. Conference on Information and Communications Security, 2006

    Google Scholar 

  19. Molnar, D., Soppera, A. and Wagner, D. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. Selected Areas in Cryptography, 2005

    Google Scholar 

  20. Staake, T., Thiesse, F. and Fleisch, E. Extending the EPC Network - The Potential of RFID in Anti-Counterfeiting. Symposium on Applied Computing, 2005

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Nohl, K., Evans, D. (2008). Design Trade-Offs for Realistic Privacy. In: Kitsos, P., Zhang, Y. (eds) RFID Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-76481-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-76481-8_4

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-76480-1

  • Online ISBN: 978-0-387-76481-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics