110 likes | 483 Views
Privacy threats and issues in mobile RFID. From : IEEE Author : Hyangjin Lee, Jeeyeon Kim. Presented by Shih Yu Chen. Introduction. Identify objects and users. Automatically take advantage of contextual information. A core technology of ubiquitous infrastructure.
E N D
Privacy threats and issues in mobile RFID From:IEEE Author:Hyangjin Lee, Jeeyeon Kim. Presented by Shih Yu Chen
Introduction • Identify objects and users. • Automatically take advantage of contextual information. • A core technology of ubiquitous infrastructure. • Been applied to many applications.
Applications Retail and supply chain Mobile RFID Homecare Healthcare
Mobile RFID • Use mobile phone as RFID reader. • By integrating RFID and wireless sensor network infrastructure with mobile communication and wireless internet. • Need to exist telecommunication companies between users and enterprise server.
Air Interface RFID tags ……….. RFID Reader …. Gateway Service Provider
Privacy threats in RFID • Location threat *Users *Tagged objects • Preference threat • Constellation threat • Transaction threat
Proposed solution for privacy threats in RFID • Killing and sleeping • Tag password *Verify ok → information • Tag pseudonyms • Encryption • Blocking *Privacy bit:0→public;1→private
Additional privacy threats in mobile RFID • Tag-carrying → Reader-carrying….risk↑ • Mobility *Unlimited collection of personal information. • Seriously location privacy *By mobile phone • Service model of mobile RFID application *B2C
Conclusion • Mobile RFID is a newly promising application. • But , mobility of reader and its service model will cause some additional privacy threats.