A Trajectory Privacy Model for Radio-Frequency Identification System

被引:0
|
作者
Wei Zhang
Longkai Wu
Sanya Liu
Tao Huang
Yajun Guo
Chingfang Hsu
机构
[1] Central China Normal University,National Engineering Research Center for E
[2] Central China Normal University,Learning
[3] Nanyang Technological University,School of Computer
来源
关键词
RFID; Trajectory privacy; Privacy model; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Here we propose a trajectory privacy model to solve privacy and security problems with radio-frequency identification (RFID) systems. The model first formalizes an Adversary Model and then defines an adversary indistinguishability privacy game and interval security privacy game according to the ability of the adversary. Based on the privacy game between adversary and challenger, the author gives the definition of weak trajectory privacy and strong trajectory privacy. Finally, we analyzed the privacy protection level of present RFID systems with the help of this trajectory privacy model. It can be seen that the trajectory privacy model can effectively analyze and find the privacy vulnerabilities of RFID security protocols.
引用
收藏
页码:1121 / 1134
页数:13
相关论文
共 50 条
  • [31] Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    Henrici, D
    Müller, P
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 149 - 153
  • [32] Privacy debate centers on radio frequency identification
    Alfonsi, BJ
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (02) : 12 - 12
  • [33] An ethical exploration of privacy and radio frequency identification
    Peslak, AR
    [J]. JOURNAL OF BUSINESS ETHICS, 2005, 59 (04) : 327 - 345
  • [34] RADIO-FREQUENCY SYSTEM .2. FREQUENCY CONTROL
    BLEWETT, JP
    ROGERS, EJ
    SWARTZ, CE
    [J]. REVIEW OF SCIENTIFIC INSTRUMENTS, 1953, 24 (09): : 782 - 788
  • [35] Under our skin (Radio-frequency identification tag)
    Wist, Sara
    [J]. AMERICAN SCHOLAR, 2008, 77 (01): : 14 - 14
  • [36] Radio-Frequency Identification and Human Tagging: Newer Coercions
    Kakabadse, Nada K.
    Kouzmin, Alexander
    Kakabadse, Andrew P.
    [J]. INTERNATIONAL JOURNAL OF E-POLITICS, 2010, 1 (02) : 29 - 45
  • [37] Wavelet Fingerprinting of Radio-Frequency Identification (RFID) Tags
    Bertoncini, Crystal
    Rudd, Kevin
    Nousain, Bryan
    Hinders, Mark
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (12) : 4843 - 4850
  • [38] Reactivable passive radio-frequency identification temperature indicator
    Windl, Roman
    Bruckner, Florian
    Abert, Claas
    Suess, Dieter
    Huber, Thomas
    Vogler, Christoph
    Satz, Armin
    [J]. JOURNAL OF APPLIED PHYSICS, 2015, 117 (17)
  • [39] The Orwellian Nature of Radio-Frequency Identification in the Perioperative Setting
    Baker, Joy Don
    [J]. AORN JOURNAL, 2016, 104 (04) : 281 - 284
  • [40] Detection and identification of objects based on radio-frequency signatures
    Somnath Mukherjee
    [J]. annals of telecommunications - annales des télécommunications, 2013, 68 : 459 - 466