Sciweavers

Share
WPES
2005
ACM

Privacy for RFID through trusted computing

7 years 11 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. One of the biggest challenges for RFID technology is to provide privacy protection without raising tag production and management cost. We introduce a new architecture that uses trusted computing primitives to solve this problem. Our design splits the RFID reader into three software modules: a Reader Core with basic functionality, a Policy Engine that controls the use of RFID-derived data, and a Consumer Agent that performs privacy audits on the RFID reader and exports audit results to third party auditors. Readers use remote attestation to prove they are running a specific Reader Core, Policy Engine, and Consumer Agent. As a result, remote attestation allows concerned individuals to verify that RFID readers comply with privacy regulations, while also allowing the reader owner to verify that the reader has not...
David Molnar, Andrea Soppera, David Wagner
Added 26 Jun 2010
Updated 26 Jun 2010
Type Conference
Year 2005
Where WPES
Authors David Molnar, Andrea Soppera, David Wagner
Comments (0)
books