RFID Privacy Using User-controllable Uniqueness
نویسندگان
چکیده
In this paper, we propose two approaches to protect privacy in the 'Digitally Named World', which is the environment in which 'radio frequency ID's (RFIDs) are attached to any objects in the world, and any objects in the real world can be found by the readers of the RFIDs and the networked database system. One is the approach to conceal the permanent ID under a private ID that users give. The other approach is to assign partial ID sequence to a object, and the rest is given by user-assignable RFID tags. These approaches both attempt to give users the controllability of the uniqueness of IDs from local to global, thereby enabling IDs private or public ones in the required stage of the object's life cycle.
منابع مشابه
Rfid: a Survey of Ethical and Privacy Concerns
Radio Frequency Identification (RFID) has garnered much attention in recent years as a method of supplanting the barcode. The uniqueness that RFID has engendered, allowing an instance of a product to be tracked, has raised some important privacy concerns. RFID technology has also promised to increase the amount of aggregate data that is collected. When dealing with data, especially the tremendo...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملBroader privacy issues
In RFID, identification takes place in an overt way, even though the user may be unaware of its consequences. Although RFID is getting a lot of attention, other technology may undermine privacy as much as RFID by using covert identification. Privacy enabling solutions based on disabling RFID may unfortunately be bypassed. The issue that passive or active RFID or ubiquitous computers in general ...
متن کاملPrivacy Threats in RFID Group Proof Schemes
RFID tag is a small and inexpensive microchip which is capable of transmitting unique identifier through wireless network in a short distance. If a group of RFID tags can be scanned simultaneously by one reader, RFID Group proof could be generated. Group proof can be used in various applications, such as good management which is usually achieved using barcode system. A lot of RFID group proof s...
متن کاملTraceability improvements of a new RFID protocol based on EPC C1 G2
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
متن کامل