Filters








11,436 Hits in 2.0 sec

User Privacy in RFID Networks [chapter]

Dave Singelée, Stefaan Seys
2010 ISSE 2009 Securing Electronic Business Processes  
We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed.  ...  Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.  ...  Acknowledgements Dave Singelée's work was supported by the Interdisciplinary institute for Broadband Technology (IBBT) and in part by the Concerted Research Action (GOA) Ambiorics 2005/11 of the Flemish  ... 
doi:10.1007/978-3-8348-9363-5_20 dblp:conf/isse/SingeleeS09 fatcat:cszsov3bsfblti3iwszlotchw4

His Late Master's Voice: Barking for Location Privacy [chapter]

Mike Burmester
2011 Lecture Notes in Computer Science  
Nipper is a low-cost RFID device that responds only to Alice's callsmaking it possible for Alice to locate the hidden treasure later (she is quite forgetful) when Eve is not around.  ...  Localization privacy requires that an RFID tag will only respond to a challenge from an RFID reader if it can first ascertain that the challenge is authentic and fresh (current). 1 In particular, that  ...  Then the adversary may record the challenge of the RFID reader and replay the challenge later (an offline man in the middle attack).  ... 
doi:10.1007/978-3-642-25867-1_2 fatcat:qknijpe7pjctjg4md7beho75se

RFID privacy

Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li
2009 Proceedings of the 16th ACM conference on Computer and communications security - CCS '09  
Privacy of RFID systems is receiving increasing attention in the RFID community.  ...  In this sense, a pseudorandom function family is the minimal requirement on an RFID tag's computational power for enforcing strong RFID system privacy.  ...  This work is partly supported by A*Star SERC Grant No. 082 101 0022 in Singapore. Dr. Ma's work is also partly supported by NSFC under granted No. 60703094 in China.  ... 
doi:10.1145/1653662.1653670 dblp:conf/ccs/MaLDL09 fatcat:czcta73ktnd4zpssbswhnuqv2a

A Survey on Privacy Frameworks for RFID Authentication

Chunhua SU, Yingjiu LI, Yunlei ZHAO, Robert H. DENG, Yiming ZHAO, Jianying ZHOU
2012 IEICE transactions on information and systems  
in RFID system.  ...  In this paper, we make a comparative and survey study on the proposed RFID privacy frameworks.  ...  However, in such a case, forward/backward privacy may not be achievable if the challenge tag is corrupted in the middle of a session; this is the reason why it is required in [9] that the challenge tag  ... 
doi:10.1587/transinf.e95.d.2 fatcat:2xaza2xudzcenjkptqqtsmph5i

On two RFID privacy notions and their relations

Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma
2011 ACM Transactions on Privacy and Security  
Privacy of RFID systems is receiving increasing attention in the RFID community.  ...  In this sense, a pseudorandom function family is the minimal requirement on an RFID tag's computational power for enforcing RFID system privacy.  ...  ACKNOWLEDGMENTS The authors are grateful to the editor-in-chief, the associate editor, and the anonymous reviewers for their valuable comments.  ... 
doi:10.1145/2043628.2043631 fatcat:erjcguur7fhmlkxsjfzv4ypzwa

Privacy Of Rfid Systems: Security Of Personal Data For End-Users

Firoz Khan
2016 Zenodo  
Privacy of RFID systems is receiving increasing attention in the RFID community.  ...  In this paper, we will discuss how the different industries use RFID and the potential privacy and security issues while RFID is implemented in these industries.  ...  RFID in Healthcare Industry B. RFID for Personal Identification C.RFID for Secure Payment D.RFID in Libraries E. RFID in Credit Cards F.  ... 
doi:10.5281/zenodo.1126775 fatcat:5emtlnsoprfrdbybwc6oj6pm7q

Revisiting Unpredictability-Based RFID Privacy Models [chapter]

Junzuo Lai, Robert H. Deng, Yingjiu Li
2010 Lecture Notes in Computer Science  
Recently, there have been several attempts in establishing formal RFID privacy models in the literature.  ...  In this paper, we first revisit the existing RFID privacy models and point out their limitations.  ...  This work is partly supported by the Office of Research, Singapore Management University, and also supported in part by A*Star SERC Grant No. 082 101 0022 in Singapore.  ... 
doi:10.1007/978-3-642-13708-2_28 fatcat:ecxcfjqltvbn7duamwquc4l634

RFID Applications and Adoptions in Healthcare: A Review on Patient Safety

Moutaz Haddara, Anna Staaby
2018 Procedia Computer Science  
Through a literature review, this paper attempts to explore the challenges of RFID adoption in healthcare, with a focus on patient safety.  ...  Even though RFID promises several benefits for the healthcare industry, the adoption of RFID technology in the health sector has not been as striking as anticipated and still lags behind compared to other  ...  These security and privacy challenges are amplified by the lack of industrial standards and secure protocols for RFID in healthcare (38) .  ... 
doi:10.1016/j.procs.2018.10.012 pmid:32288898 pmcid:PMC7129262 fatcat:4lhlvfwskvchhkvtd2nbmkjytu

The Outer Limits of RFID Security [chapter]

Ari Juels
2006 Lecture Notes in Computer Science  
It is tempting to regard RFID security and privacy primarily as questions of cryptographic protocol design. We would like RFID tags to authenticate themselves in a trustworthy manner.  ...  For example, as a surprising challenge to RFID privacy, recent research has shown that "dead" tags may be detectable and even classifiable based on their RF signatures.  ...  It is tempting to regard RFID security and privacy primarily as questions of cryptographic protocol design. We would like RFID tags to authenticate themselves in a trustworthy manner.  ... 
doi:10.1007/11894063_18 fatcat:s5p5ivlm2rft7fnjb5mtsy4xxi

Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy [chapter]

Shaohui Wang, Sujuan Liu, Danwei Chen
2013 Communications in Computer and Information Science  
Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system.  ...  In addition, we present a new protocol, called Challenge-Hiding GPS, based on the Schnorr identification scheme.  ...  In Conclusions Privacy is an important issue required as to the security of RFID system, and backward privacy is a very strong privacy definition.  ... 
doi:10.1007/978-3-642-36252-1_43 fatcat:2ynymzxaenhjdaot2cuh4iicwy

RADIO FREQUENCY IDENTIFICATION TECHNOLOGY AND CONSUMER PRIVACY

2007 Issues in Information Systems  
Radio frequency identification (RFID) technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption.  ...  The focus of this study is to show the business value of RFID technology and the related issues, especially consumer privacy issue that organizations need to be concerned about.  ...  This study attempts to show issues and challenges that management face in the deployment of RFID, especially the privacy issue.  ... 
doi:10.48009/2_iis_2007_341-347 fatcat:xw3a2x7gajhzbjijobp42c6omq

Study of the Privacy Models in RFID Authentication Protocols

Jian Shen, Wenying Zheng, Jin Wang, Zhihua Xia, Zhangjie Fu
2013 International Journal of Security and Its Applications  
privacy in RFID system.  ...  Privacy is a major concern in RFID systems, especially with widespread deployment of wireless enabled interconnected personal devices.  ...  Acknowledgements This work is supported in part by the research fund from Nanjing University of Information Science and Technology  ... 
doi:10.14257/ijsia.2013.7.6.35 fatcat:fhpx5k7axvaedhcrqfgp7habsi

Privacy preserving on Radio Frequency Identification systems

Hua Wang, Lili Sun, Jianming Yong, Yongbing Zhang
2009 2009 13th International Conference on Computer Supported Cooperative Work in Design  
This paper focuses on the challenges on the privacy of Radio Frequency Identification (RFID) systems.  ...  The security and privacy challenges are analysed after a brief introduction of various RFID systems and their associated operations.  ...  The authors have also discussed both the framework of RFID systems and challenges in manufacturer and distributors, and the label was contributed to the security and privacy features.  ... 
doi:10.1109/cscwd.2009.4968136 dblp:conf/cscwd/WangSYZ09 fatcat:ytel6xee6vgohi3zkpvgydeyoq

RFID Technology for the Health Care Sector

Jordi Castella-Roca, Agusti Solanas
2008 Recent Patents on Electrical Engineering  
about RFID in health care.  ...  Radio frequency identification (RFID) technology has gained ubiquitous applications in various aspects in recent years.  ...  : challenges faced in health care and RFID applications in health care.  ... 
doi:10.2174/1874476110801010022 fatcat:yyaeco6cbrg53ou4n7yum42lmu

Refresh: Weak Privacy Model for RFID Systems

Li Lu, Yunhao Liu, Xiang-Yang Li
2010 2010 Proceedings IEEE INFOCOM  
Due to the lack of proper formal models, it cannot be theoretically proven that the degraded PPA schemes can achieve acceptable privacy in practical RFID systems.  ...  Adopting the Strong Privacy model, PPA schemes have to employ brute-force search in tags' authentications, which incurs unacceptable overhead and delay to large-scale RFID systems.  ...  First, at the step (7) in the privacy game, the challenger C refreshes the private information of the two challenge candidates T * 0 and T * 1 .  ... 
doi:10.1109/infcom.2010.5462153 dblp:conf/infocom/LuLL10 fatcat:6itak3rnone7lflshrwvffy2km
« Previous Showing results 1 — 15 out of 11,436 results