skip to main content
article
Free Access

RFID privacy issues and technical challenges

Authors Info & Claims
Published:01 September 2005Publication History
Skip Abstract Section

Abstract

Cheap tags and technology simple and secure enough to ensure personal data privacy are required before retailers implement and consumers trust and confidently use them on a mass scale.

References

  1. Juels, A. Minimalist cryptography for low-cost RFID tags. In Proceedings of the Security in Communication Networks Conference (Amalfi, Italy, Sept. 8--10). Springer-Verlag, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Juels, A. and Pappu, R. Squealing Euros: Privacy protection in RFID-enabled banknotes. In Proceedings of Financial Cryptography (Gosier, Guadeloupe, FWI, Jan. 27--30). Springer-Verlag, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  3. Juels, A., Rivest, R., and Szydlo, M. The blocker tag: Selective blocking of RFID tags for consumer privacy. In Proceedings of the 10th ACM Conference on Computer and Communications Security (Washington, D.C., Oct. 27--30). ACM Press, New York, 2003, 103--111. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Kinoshita, S., Ohkubo, M., Hoshino, F., Morohashi, G., Shionoiri, O., and Kanai, A. Privacy-enhanced active RFID tag. In Proceedings of ECHISE 2005 (Munich, Germany, May 11, 2005).Google ScholarGoogle Scholar
  5. Kinoshita, S., Hoshino, F., Komuro, T., Fujimura, A., and Ohkubo, M. Low-cost RFID privacy protection scheme. IPS Journal 45, 8 (Aug. 2004), 2007--2021 (in Japanese).Google ScholarGoogle Scholar
  6. Ohkubo, M., Suzuki, K., and Kinoshita, S. A cryptographic approach to `privacy-friendly' tags. Presented at the RFID Privacy Workshop (MIT, Cambridge, MA, Nov. 15 2003); rfidprivacy.ex.com/2003/agenda.php.Google ScholarGoogle Scholar
  7. Weis, S. Security and Privacy in Radio-Frequency Identification Devices. Masters thesis, MIT, Cambridge, MA, May 2003; crypto.csail.mit.edu~sweis/.Google ScholarGoogle Scholar
  8. Weis, S., Sarma, S., Rivest, R., and Engels, D. Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of Security in Pervasive Computing (Boppard, Germany, Mar. 12--14). Springer-Verlag, 2003.Google ScholarGoogle Scholar
  9. Wired News. What your clothes say about you. (Mar. 12, 2003); www.wired.com/news/wireless/o,1382,58006,00.html; see also www.boycottbenetton.com.Google ScholarGoogle Scholar
  10. ZDNet. California bill would ban tracking chips in IDs. (Apr. 28, 2005); news.zdnet.com/2100-1035_22_5689358.html.Google ScholarGoogle Scholar
  11. ZDNet. Privacy activists demand Tesco boycott over RFID. (Jan. 26, 2005); news.zdnet.co.uk/09,39020330,39185481.00.htm; see also www.boycotttesco.com.Google ScholarGoogle Scholar

Index Terms

  1. RFID privacy issues and technical challenges

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 48, Issue 9
                Special issue: RFID
                September 2005
                109 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/1081992
                Issue’s Table of Contents

                Copyright © 2005 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 September 2005

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format