共查询到20条相似文献,搜索用时 15 毫秒
1.
RFID and privacy: what consumers really want and fear 总被引:1,自引:0,他引:1
Sarah Spiekermann 《Personal and Ubiquitous Computing》2009,13(6):423-434
This article investigates the conflicting area of user benefits arising through item level radio frequency identification
(RFID) tagging and a desire for privacy. It distinguishes between three approaches feasible to address consumer privacy concerns.
One is to kill RFID tags at store exits. The second is to lock tags and have user unlock them if they want to initiate reader
communication (user model). The third is to let the network access users’ RFID tags while adhering to a privacy protocol (network
model). The perception and reactions of future users to these three privacy enhancing technologies (PETs) are compared in
the present article and an attempt is made to understand the reasoning behind their preferences. The main conclusion is that
users do not trust complex PETs as they are envisioned today. Instead, they prefer to kill RFID chips at store exits even
if they appreciate after sales services. Enhancing trust through security and privacy ‘visibility’ as well as PET simplicity
may be the road to take for PET engineers in UbiComp. 相似文献
2.
A survey of computational location privacy 总被引:6,自引:1,他引:5
John Krumm 《Personal and Ubiquitous Computing》2009,13(6):391-399
This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location
data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well
as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques
like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data
as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked
location data, and computational countermeasures for mitigating these threats. 相似文献
3.
近年来,各种基于无线射频识别(RFID)技术的物联网系统得到大量应用,如何保护用户的隐私和安全也随之变得越来越重要.在传输信息前进行认证是提高系统安全性的一个重要方法.现有的RFID认证协议大多需要一个中心服务器来保存该系统所有RFID标签的相关信息,但是这类协议在认证时读写器必须与服务器保持实时连接.很多覆盖区域比较大的物联网系统很难实现这种实时性,保证读写器与服务器之间通信的安全也需要额外的开销.针对这两个问题,提出了一种新的无需服务器支持的RFID认证协议,该协议实现方便,同时提供了很好的安全性和隐私性.通过分析可知,它可以抵御各种常见攻击. 相似文献
4.
5.
射频识别RFID(Radio Frequency Identity)技术是一种非接触的自动识别技术,电子标签可以随身携带或者贴附在物体上,用户容易在不知不觉中被侵犯隐私。根据RFID系统中数据流的特点,提出了一种采集发布模型管理用户数据,允许用户定制数据偏好规则和数据请求规则,只有当两者匹配时,请求者才能授权获得数据。该模型具有开放性、可靠性和隐私安全等特点。 相似文献
6.
A cross-layer framework for privacy enhancement in RFID systems 总被引:1,自引:0,他引:1
In this paper, we introduce a cross-layer framework for enhancing privacy in RFID systems. The framework relies on mechanisms in the physical (PHY) layer, as well as the medium access control (MAC) layer, to provide flexible protection over the unique identifiers of low-cost RFID tags. Such a framework prevents adversaries and malicious parties from tracking RFID tags through the monitoring of their unique identifiers. More specifically, our framework relies on masking of the identifier at the PHY layer, whereby bit-collisions are induced between the backscattered tag identifier and a protective mask, such that a legitimate reader can be allowed to recover the tag identifier but an illegitimate party would not be able to do so. To strengthen the level of protection provided by the bit-collision masking method, we present the randomized bit encoding scheme that is used in our framework. In addition, we also incorporate mechanisms in the MAC layer, and make use of cross-layer interactions between the MAC and the PHY layers to provide flexible privacy protection. This allows tags that do not require privacy protection to be read conveniently while allowing tags that need to be protected to stay protected. 相似文献
7.
RFID security 总被引:2,自引:0,他引:2
Radio Frequency Identification (RFID) systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we address the security and privacy aspects of this relatively new and heterogeneous radio technology. We discuss the related security requirements, the threats and the implemented mechanisms. Then the current security and privacy proposals and their enhancements are presented. Finally we discuss the role of this technology in Ubiquitous Computing. 相似文献
8.
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value 总被引:4,自引:0,他引:4
Radio Frequency IDentification (RFID ) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. Since an RFID system has the advantage of simultaneously recognizing massive amounts of information, it is expected to replace the bar-code system. The most important problem with an RFID system is that an adversary can access the tag information, which gives rise to privacy and forgery problems. This paper presents a hash-based mutual authentication protocol as a solution. The proposed protocol is designed to send a random number generated by a tag to a back-end server without disclosure. Moreover it substitutes a random number with a secret value, which is employed in a response message. The properties of the proposed protocol enable constant creation of distinct response messages without interferences from intended or meaningless requests generated by an adversary, while the secret value is not directly transmitted. Our proposed protocol make is difficult for an attacker to launch successful brute-force attacks against our approach. 相似文献
9.
Deep Neural Network (DNN), one of the most powerful machine learning algorithms, is increasingly leveraged to overcome the bottleneck of effectively exploring and analyzing massive data to boost advanced scientific development. It is not a surprise that cloud computing providers offer the cloud-based DNN as an out-of-the-box service. Though there are some benefits from the cloud-based DNN, the interaction mechanism among two or multiple entities in the cloud inevitably induces new privacy risks. This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services. We systematically and thoroughly review privacy attacks and defenses in the pipeline of cloud-based DNN service, i.e., data manipulation, training, and prediction. In particular, a new theory, called cloud-based ML privacy game, is extracted from the recently published literature to provide a deep understanding of state-of-the-art research. Finally, the challenges and future work are presented to help researchers to continue to push forward the competitions between privacy attackers and defenders. 相似文献
10.
RFID, with its capability of remote automatic identification, is taking the place of barcodes and becoming the new generation of electronic tags. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature; the prevalence of RFID has greatly increased security and privacy concerns. In 2008, Chen et al. proposed an RFID authentication scheme which can enhance security and privacy by using hash functions and quadratic residues. However, their scheme was found to be vulnerable to impersonation attacks. This study further demonstrates that their scheme does not provide location privacy and suffers from replay attacks. An improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security. 相似文献
11.
12.
RFID技术是近年来业界关注的热点,被认为是21世纪最重要的技术之一。本文结合普适计算环境发展的趋势,提出了集成RFID的智能建筑系统原型和模块设计,并对RFID在智能建筑系统中的安全及隐私性设计进行了详细论述。 相似文献
13.
随着物联网事业的飞速发展,RFID技术做为物联网最底层的感知技术也得到飞速的发展。但是由于RFID系统开放式的应用环境以及设备的特殊性和局限性,使得RFID系统面临许多隐私安全问题。对RFID系统进行概述,并且对现有的RFID安全协议和安全模型进行综述和评价,并给出RFID系统隐私保护今后的研究方向。 相似文献
14.
15.
16.
基于Hash链的RFID隐私增强标签研究 总被引:4,自引:0,他引:4
无线射频识别(RFID)作为一种新型的自动识别技术在供应链与零售业中得到了广泛的应用。然而由于RFID标签强大的追踪能力,RFID的广泛应用也势必给消费者带来新的隐私威胁问题。在构造RFID方案时有几个技术关键点,尤其重要的是消费者隐私与标签信息的安全问题。低成本是另外一个关键。针对这些问题,讨论并阐明了RFID系统的需求与限制,分析了现有的一些相关的RFID方案的特性与问题。最后提出了一种简单的采用低成本的Hash链机制的安全模式标签来增强消费者隐私。 相似文献
17.
隐私安全问题是移动RFID众多安全问题中最重要的问题之一.对移动RFID的隐私安全问题进行研究,并提出一个基于策略的移动RFID隐私保护系统,该系统通过建立和管理应用服务的隐私保护策略,并根据标签的隐私策略对信息进行访问控制,确保隐私安全. 相似文献
18.
With the development and increasing deployment of smart home devices, voice control supports comfortable end user interactions. However, potential end users may refuse to use Voice-controlled Digital Assistants (VCDAs) because of privacy concerns. To address these concerns, some manufacturers provide limited privacy-preserving mechanisms for end users; however, these mechanisms are seldom used. We herein provide an analysis of privacy threats resulting from the utilization of VCDAs. We further analyze how existing solutions address these threats considering the principles of the European General Data Protection Regulation (GDPR). Based on our analysis, we propose directions for future research and suggest countermeasures for better privacy protection. 相似文献
19.
On a new formal proof model for RFID location privacy 总被引:2,自引:0,他引:2
We discuss a recently proposed formal proof model for RFID location privacy. We show that protocols which intuitively and in several other models are considered not to be location private, are provably location private in this model. Conversely, we also show that protocols which obviously are location private, are not considered location private in this model.Specifically, we prove a protocol in which every tag transmits the same constant message to not be location private in the proposed model. Then we prove a protocol in which a tag's identity is transmitted in clear text to be weakly location private in the model. 相似文献
20.
Gaurav Kapoor Selwyn Piramuthu 《Engineering Applications of Artificial Intelligence》2011,24(7):1300-1302
As incorporation of RFID (Radio Frequency IDentification) tags in a wide variety of applications increase, there is a need to ensure the security and privacy of the entity to which these tags are attached. Not surprisingly, this is a very active area as attested by the large number of related published research literature. Recently, the journal engineering applications of artificial intelligence published a paper by Chen and Deng (2009) where the authors propose a mutual authentication protocol for RFID. This protocol has fundamental flaws that can be readily taken advantage by a resourceful adversary. We identify and discuss these vulnerabilities and point out the characteristics of this protocol that exposes it to these vulnerabilities. 相似文献