Some methods for privacy in RFID communication

作者: Kenneth P. Fishkin , Sumit Roy , Bing Jiang

DOI: 10.1007/978-3-540-30496-8_5

关键词:

摘要: For RFID tags to gain general acceptance, they will have offer powerful and flexible privacy mechanisms. After reviewing existing upcoming mechanisms for privacy, we propose that a key aspect of communication with passive tags, namely its required energy transference from an external antenna, may promise when developing We present two proposals such In the first mechanism, analysis received signal by can be used estimate reader distance (and hence trust). show simple metric analogous noise ratio correlates well rough distance. second, antenna is power tiered authentication scheme, in which reveal more information about themselves trusted and/or “energetic” readers.

参考文章(6)
Kenneth P. Fishkin, Bing Jiang, Matthai Philipose, Sumit Roy, I Sense a Disturbance in the Force: Unobtrusive Detection of Interactions with RFID-tagged Objects ubiquitous computing. pp. 268- 282 ,(2004) , 10.1007/978-3-540-30119-6_16
Ari Juels, Ronald L. Rivest, Michael Szydlo, The blocker tag: selective blocking of RFID tags for consumer privacy computer and communications security. pp. 103- 111 ,(2003) , 10.1145/948109.948126
Marco Gruteser, Dirk Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys '03. pp. 31- 42 ,(2003) , 10.1145/1066116.1189037
Jason I. Hong, James A. Landay, An architecture for privacy-sensitive ubiquitous computing Proceedings of the 2nd international conference on Mobile systems, applications, and services - MobiSYS '04. pp. 177- 189 ,(2004) , 10.1145/990064.990087
Naveen Sastry, Umesh Shankar, David Wagner, Secure verification of location claims workshop on wireless security. pp. 1- 10 ,(2003) , 10.1145/941311.941313