Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
On two RFID privacy notions and their relations
Li Y., Deng R., Lai J., Ma C. ACM Transactions on Information and System Security14 (4):1-23,2011.Type:Article
Date Reviewed: Jun 20 2012

As radio frequency identification (RFID) technology becomes widespread, such as for high-speed highway toll payments, ensuring user security and privacy is paramount. At issue is the unauthorized accessing of RFID user tags through an adversary RFID reader, with the intent to track or masquerade as the user. The authors describe two RFID privacy-preserving concepts that provide user anonymity and unlinkability of the protocol transcripts of a tag. They describe the difference between “unp-privacy” (based on the unpredictability of a tag) and “ind-privacy” (based on the indistinguishability between two tags). Even though ind-privacy is arguably the correct notation, proven implementations haven’t been observed. Thus, the authors provide their own unp*-privacy protocol, which they say implies ind-privacy.

This paper provides a very readable layman’s explanation of the adversary issues with RFID technology, “including eavesdropping, alteration of communication messages, replay attacks, corruption of tags, and physical or side-channel attacks to tags.” Throughout the paper, the authors describe these issues and include the rigor of detailed theorems and proofs. They describe an RFID model, the adversary, and the completeness and soundness of RFID systems.

With that RFID model foundation, the authors go on to describe the various limitations of the privacy models. For example, even though the various protocols provide two or three round-trip query communications between a reader and the RFID tag, there are still areas an adversary can exploit. In contrast to other security protocols, large or unlimited amounts of communication are not acceptable here because of the rapid response requirements, such as that car traveling through the toll. In addition, most current privacy flaws occur because the RFID protocols are too lightweight and cannot implement appropriate cryptographic functions.

Finally, the authors provide detailed information on their new privacy model, unp*-privacy. They show how an adversary cannot distinguish the output of a real tag from that of a virtual tag without the secret key. This means the number of round-trip queries doesn’t affect the protocol’s effectiveness. However, in contrast to lightweight protocols, the unp*-privacy protocol requires that each RFID tag must be able to compute a pseudorandom function (PRF) or its equivalent. The authors identify these constraints and define the open problems for finding a minimal condition to enforce ind-privacy in RFID systems.

This paper will be valuable to those developing various large-scale RFID systems, like traffic tolling systems, where privacy and anonymity has always been a concern. The described techniques allow developers to create more advanced capabilities, without the issues inherent to the various lightweight and privacy-prone approaches.

Reviewer:  Scott Moody Review #: CR140282 (1211-1138)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
 
Cryptographic Controls (D.4.6 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy