Przemyslaw Blaskiewicz, M. Klonowski, Krzysztof Majcher, P. Syga
{"title":"Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems","authors":"Przemyslaw Blaskiewicz, M. Klonowski, Krzysztof Majcher, P. Syga","doi":"10.1109/CyberC.2013.23","DOIUrl":null,"url":null,"abstract":"In this paper we present methods of protecting RFID tags users' privacy. Based on well-known technique by Juels et al. called Blocker tag we introduce a set of methods for increasing security using a device called Hedgehog blocker. Hedgehog blocker copes with the problem of the additional information gained by the adversary through measuring signal power (i.e. learning the number of transmitting tags). We claim that although Hedgehog blocker would be more expensive than regular Blocker tags, it provides privacy protection within the context of a more realistic model. On the other hand Hedgehog blocker does not require any powerful devices like Selective jamming due to Rieback et al. We also introduce the ideas called Preventer and Proxy allower that are more demanding in terms of costs and computational power, however assuring nearly perfect protection against an adversary with ability to determine the number of antennas transmitting.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"285 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberC.2013.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this paper we present methods of protecting RFID tags users' privacy. Based on well-known technique by Juels et al. called Blocker tag we introduce a set of methods for increasing security using a device called Hedgehog blocker. Hedgehog blocker copes with the problem of the additional information gained by the adversary through measuring signal power (i.e. learning the number of transmitting tags). We claim that although Hedgehog blocker would be more expensive than regular Blocker tags, it provides privacy protection within the context of a more realistic model. On the other hand Hedgehog blocker does not require any powerful devices like Selective jamming due to Rieback et al. We also introduce the ideas called Preventer and Proxy allower that are more demanding in terms of costs and computational power, however assuring nearly perfect protection against an adversary with ability to determine the number of antennas transmitting.