RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Untraceable RFID tags via insubvertible encryption
Proceedings of the 12th ACM conference on Computer and communications security
Wireless identification -- privacy and security
BT Technology Journal
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Covert channels in privacy-preserving identification systems
Proceedings of the 14th ACM conference on Computer and communications security
An anti-counterfeiting RFID privacy protection protocol
Journal of Computer Science and Technology
A framework for fast RFID tag reading in static and mobile environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
A cross-layer framework for privacy enhancement in RFID systems
Pervasive and Mobile Computing
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
rfid in pervasive computing: State-of-the-art and outlook
Pervasive and Mobile Computing
Cellular automata-based authentication for low-cost RFID systems
International Journal of Communication Networks and Distributed Systems
Defining strong privacy for RFID
ACM Transactions on Information and System Security (TISSEC)
An efficient forward private RFID protocol
Proceedings of the 16th ACM conference on Computer and communications security
When Compromised Readers Meet RFID
Information Security Applications
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Untraceability of RFID protocols
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
New privacy results on synchronized RFID authentication protocols against tag tracing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Physical-layer identification of RFID devices
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Lightweight privacy preserving authentication for RFID using a stream cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Classifying RFID attacks and defenses
Information Systems Frontiers
Securing the use of RFID-enabled banknotes
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
Security analysis and complexity comparison of some recent lightweight RFID protocols
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Comprehensive protection of RFID traceability information systems using aggregate signatures
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Implementation of terminal middleware platform for mobile RFID computing
International Journal of Ad Hoc and Ubiquitous Computing
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Low-Cost cryptography for privacy in RFID systems
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Noisy tags: a pretty good key exchange protocol for RFID tags
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
MARP: mobile agent for RFID privacy protection
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
RFID system with fairness within the framework of security and privacy
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Security flaws in a recent RFID delegation protocol
Personal and Ubiquitous Computing
Privacy for public transportation
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
New security problem in RFID systems “tag killing”
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Modeling privacy for off-line RFID systems
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
A privacy-restoring mechanism for offline RFID systems
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Addressing flaws in RFID authentication protocols
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
New privacy issues in mobile telephony: fix and verification
Proceedings of the 2012 ACM conference on Computer and communications security
Forward secure privacy protection scheme for rfid system using advanced encryption standard
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
An Evaluation of the RFID Security Benefits of the APF System: Hospital Patient Data Protection
International Journal of Advanced Pervasive and Ubiquitous Computing
Critical Evaluation of RFID Security Protocols
International Journal of Information Security and Privacy
Unbalanced states violates RFID privacy
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious implications on the privacy of people carrying tagged items. Serious opposition from consumers has already thwarted several trials of this technology. The main fears associated with the tags is that they may allow other parties to covertly collect information about people or to trace them wherever they go. As long as these privacy issues remain unresolved, it will be impossible to reap the benefits of these new applications. Current solutions to privacy problems are typically limited to the application layer. RFID system have three layers, application, communication and physical. We demonstrate that privacy issues cannot be solved without looking at each layer separately. We also show that current solutions fail to address the multilayer aspect of privacy and as a result fail to protect it. For each layer we describe the main threats and give tentative solutions.