Abstract
This chapter presents some new developments for the security and privacy protection of the future contactless smart devices. The main objective is to anticipate the forthcoming expectation from consumers and citizens for high level of trust and confidence about the next contactless nomadic devices by creating a private sphere where they will have full control to manage contactless transactions. The first objective is to build some mechanism and probably associated specific devices to offer to the user the capabilities for privacy management with the awareness of the local RF activity, the avoidance of any digital transaction without the consent of the owner of the data, the control of all the exchanged data with checking through a display, and the personal management of black lists of nonauthorized devices. To raise trust and confidence, these functions would be managed by a specific device, a so-called Contactless Privacy Manager that will be user-centric. The second objective is to secure the contactless link in order to provide a private data exchange with noisy readers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Federal Office for Information Security (2004) Security aspects and prospective applications of RFID systems. Germany
Ko G, Karger P (2004) Preventing security and privacy attacks on machine readable travel documents. In: Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 47–58, University of Columbia and IBM Research Division
Schneier B (2005) Fatal flaw weakens RFID passports. In: Wired News, n°69453
Savry O, Vacherand F, Crochon E (2004) Contactless privacy protection device. Patent WO2006/035177
Kfir Z, Wool A (2004) Picking virtual pockets using relay attacks on contactless smartcard systems. In: Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 47–58
Hancke G (2004) A practical relay Attack on ISO 14443 Proximity Cards. In: IEEE Symposium on Security and Privacy (S&P’06)
Juels A et al (2003) The blocker tag: selective blocking of RFID tags for consumer privacy. In: 8th ACM Conference on Computer and Communications Security, pp. 103–111, ACM Press
Garfinkel SL, Juels A, Pappu R (2005) RFID privacy: An overview of problems and proposed solutions. In: IEEE security and privacy, vol. 3, no. 3, pp. 34–43, IEEE Computer Society
Castelluccia C, Avoine G (2006) Noisy tags: a pretty good key exchange protocol for RFID. In: Domingo-Ferrer J, Posegga J, Schreckling D (eds.) CARDIS No7, vol. 3928, pp. 289–299, Springer-Verlag, Tarragona, ESPAGNE (2006)
Savry O, Pebay-Peyroula F, Reverdy J, Robert G (2007) The RFID noisy reader: how to prevent from the eavesdropping on the communication. In: Paillier P, Verbauwhede I (eds.) Cryptographic Hardware and Embedded Systems - CHES 2007, vol. 4727, pp. 334–345, Springer
Kirschenbaum I, Wool A (2006) How to build a low-cost, extended-range RFID skimmer. In: Proceedings of the 15th conference on USENIX Security Symposium, vol. 15, USENIX Association
Rieback M et al (2006) A platform for RFID security and privacy administration. In: Proceedings of the 20th conference on Large Installation System Administration, pp. 8–16, Usenix Association
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media, LLC
About this paper
Cite this paper
Savry, O., Vacherand, F. (2010). Security and Privacy Protection of Contactless Devices. In: Giusto, D., Iera, A., Morabito, G., Atzori, L. (eds) The Internet of Things. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-1674-7_40
Download citation
DOI: https://doi.org/10.1007/978-1-4419-1674-7_40
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-1673-0
Online ISBN: 978-1-4419-1674-7
eBook Packages: EngineeringEngineering (R0)