Paper Abstract and Keywords |
Presentation |
2005-03-18 13:15
[Invited Talk]
A Survey of RFID Privacy Protection Technologies Shingo Kinoshita (NTT) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
A Radio Frequency Identification (RFID) tag which consists of tiny chip and antenna is expected as one of the most important infrastructure technology for ubiquitous society, because the RFID tag will be affixed to almost all items and used for various useful ubiquitous services in the future. On the one hand, such a wide deployment of RFID may expose new privacy threats of citizens by abuse of powerful tracking capability of the RFID. Recently RFID privacy issues become an object of public concern. For example, in Europe and the United States, some consumer groups has mounted protest campaigns against the RFID demonstration experiments that were planed by apparel companies, major retail stores, schools and libraries, etc, or RFID privacy protection bills were submitted in California, etc. Also in Japan, ministries announced RFID privacy protection guideline for companies that use RFID. Technical efforts fall behind such system and policy efforts at present. Privacy protection technology implemented in existing RFID tags is only Kill function that is used to permanently deactivate a tag. Privacy protection technologies other than Kill function will be needed to use RFID tags safety for various useful ubiquitous services in the future. This speech introduces a survey of RFID privacy protection technologies. First, the RFID privacy problem is classified from a technical perspective, and technical requirements about cost and performance are introduced. Next, I explain representative RFID privacy protection technologies, MIT Hash-lock method, RSA Blocker tag and NTT Hash-chain method, etc. Moreover, classification of RFID privacy protection technologies and up-to-date protection methods are also outlined. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
RFID / Privacy / Security / Encryption / EPC global / Auto-ID / / |
Reference Info. |
IEICE Tech. Rep., vol. 104, no. 732, ISEC2004-136, pp. 61-61, March 2005. |
Paper # |
ISEC2004-136 |
Date of Issue |
2005-03-10 (IT, ISEC, WBS) |
ISSN |
Print edition: ISSN 0913-5685 |
Download PDF |
|
Conference Information |
Committee |
IT WBS ISEC |
Conference Date |
2005-03-17 - 2005-03-18 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Kyoto Univ. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
general |
Paper Information |
Registration To |
ISEC |
Conference Code |
2005-03-IT-WBS-ISEC |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A Survey of RFID Privacy Protection Technologies |
Sub Title (in English) |
|
Keyword(1) |
RFID |
Keyword(2) |
Privacy |
Keyword(3) |
Security |
Keyword(4) |
Encryption |
Keyword(5) |
EPC global |
Keyword(6) |
Auto-ID |
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Shingo Kinoshita |
1st Author's Affiliation |
NTT (NTT) |
2nd Author's Name |
|
2nd Author's Affiliation |
() |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2005-03-18 13:15:00 |
Presentation Time |
60 minutes |
Registration for |
ISEC |
Paper # |
IT2004-80, ISEC2004-136, WBS2004-195 |
Volume (vol) |
vol.104 |
Number (no) |
no.730(IT), no.732(ISEC), no.734(WBS) |
Page |
p.61 |
#Pages |
1 |
Date of Issue |
2005-03-10 (IT, ISEC, WBS) |
|