Critical RFID Privacy-Enhancing Technologies

被引:25
|
作者
Spiekermann, Sarah [1 ]
Evdokimov, Sergei [2 ]
机构
[1] Carnegie Mellon Univ, Heinz Sch Publ Policy & Management, Pittsburgh, PA 15213 USA
[2] Humboldt Univ, D-1086 Berlin, Germany
关键词
Authentication; Privacy; RFID; Security;
D O I
10.1109/MSP.2009.31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some of the significant factors associated with RFID technology, that is used to automatically and remotely identify objects, are presented. Security and privacy research community are making significant efforts to develop privacy enhancing technologies (PETs) to prevent unauthorized access to RFID tags. The objective of their efforts is to develop a secure tag-reader communication and to provide consumers an effective management for their privacy in RFID-enabled environment. The on-tag scheme is a privacy scheme in which only RFID readers that can authorize themselves using a particular tag are granted access to the tag. An agent scheme allows an user to delegate privacy management to an agent that mediates tag-reader communication based on general privacy preferences. User scheme involves to design PETs for RFID to enable an user to take control over their RFID tags.
引用
收藏
页码:56 / 62
页数:7
相关论文
共 50 条
  • [1] Privacy-enhancing technologies
    Senicar, V
    Klobucar, T
    Jerman-Blazic, B
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 213 - 227
  • [2] On the Adoption of Privacy-enhancing Technologies
    Caulfield, Tristan
    Ioannidis, Christos
    Pym, David
    [J]. DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 175 - 194
  • [3] Privacy-enhancing technologies for the Internet
    Goldberg, I
    Wagner, D
    Brewer, E
    [J]. IEEE COMPCON 97, PROCEEDINGS, 1997, : 103 - 109
  • [4] Practical Privacy-Enhancing Technologies
    Hajny, Jan
    Malina, Lukas
    Dzurenda, Petr
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 60 - 64
  • [5] Usage Patterns of Privacy-Enhancing Technologies
    Coopamootoo, Kovila P. L.
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1371 - 1390
  • [6] Privacy-enhancing technologies - approaches and development
    Senicar, V
    Jerman-Blazic, B
    Klobucar, T
    [J]. COMPUTER STANDARDS & INTERFACES, 2003, 25 (02) : 147 - 158
  • [7] Isolation in cloud computing and privacy-enhancing technologies: Suitability of privacy-enhancing technologies for separating data usage in business processes
    Sonehara N.
    Echizen I.
    Wohlgemuth S.
    [J]. Business & Information Systems Engineering, 2011, 3 (3) : 155 - 162
  • [8] A Review of the Privacy-Enhancing Technologies Software Market
    Polonetsky, Jules
    Sparapani, Tim
    [J]. IEEE SECURITY & PRIVACY, 2021, 19 (06) : 119 - 122
  • [9] Privacy-Enhancing Technologies for AI Systems: A Tutorial
    d'Aliberti, Liv
    Gronberg, Evan
    Kovba, Joseph
    [J]. PROCEEDINGS OF THE 10TH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2024, 2024, : 69 - 70
  • [10] Isolation in Cloud Computing and Privacy-Enhancing Technologies
    Sonehara, Noboru
    Echizen, Isao
    Wohlgemuth, Sven
    [J]. BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2011, 3 (03) : 155 - 162