Skip to main content

Security and Privacy Protection of Contactless Devices

  • Conference paper
  • First Online:
The Internet of Things

Abstract

This chapter presents some new developments for the security and privacy protection of the future contactless smart devices. The main objective is to anticipate the forthcoming expectation from consumers and citizens for high level of trust and confidence about the next contactless nomadic devices by creating a private sphere where they will have full control to manage contactless transactions. The first objective is to build some mechanism and probably associated specific devices to offer to the user the capabilities for privacy management with the awareness of the local RF activity, the avoidance of any digital transaction without the consent of the owner of the data, the control of all the exchanged data with checking through a display, and the personal management of black lists of nonauthorized devices. To raise trust and confidence, these functions would be managed by a specific device, a so-called Contactless Privacy Manager that will be user-centric. The second objective is to secure the contactless link in order to provide a private data exchange with noisy readers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Federal Office for Information Security (2004) Security aspects and prospective applications of RFID systems. Germany

    Google Scholar 

  2. Ko G, Karger P (2004) Preventing security and privacy attacks on machine readable travel documents. In: Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 47–58, University of Columbia and IBM Research Division

    Google Scholar 

  3. Schneier B (2005) Fatal flaw weakens RFID passports. In: Wired News, n°69453

    Google Scholar 

  4. Savry O, Vacherand F, Crochon E (2004) Contactless privacy protection device. Patent WO2006/035177

    Google Scholar 

  5. Kfir Z, Wool A (2004) Picking virtual pockets using relay attacks on contactless smartcard systems. In: Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 47–58

    Google Scholar 

  6. Hancke G (2004) A practical relay Attack on ISO 14443 Proximity Cards. In: IEEE Symposium on Security and Privacy (S&P’06)

    Google Scholar 

  7. Juels A et al (2003) The blocker tag: selective blocking of RFID tags for consumer privacy. In: 8th ACM Conference on Computer and Communications Security, pp. 103–111, ACM Press

    Google Scholar 

  8. Garfinkel SL, Juels A, Pappu R (2005) RFID privacy: An overview of problems and proposed solutions. In: IEEE security and privacy, vol. 3, no. 3, pp. 34–43, IEEE Computer Society

    Google Scholar 

  9. Castelluccia C, Avoine G (2006) Noisy tags: a pretty good key exchange protocol for RFID. In: Domingo-Ferrer J, Posegga J, Schreckling D (eds.) CARDIS No7, vol. 3928, pp. 289–299, Springer-Verlag, Tarragona, ESPAGNE (2006)

    Google Scholar 

  10. Savry O, Pebay-Peyroula F, Reverdy J, Robert G (2007) The RFID noisy reader: how to prevent from the eavesdropping on the communication. In: Paillier P, Verbauwhede I (eds.) Cryptographic Hardware and Embedded Systems - CHES 2007, vol. 4727, pp. 334–345, Springer

    Google Scholar 

  11. Kirschenbaum I, Wool A (2006) How to build a low-cost, extended-range RFID skimmer. In: Proceedings of the 15th conference on USENIX Security Symposium, vol. 15, USENIX Association

    Google Scholar 

  12. Rieback M et al (2006) A platform for RFID security and privacy administration. In: Proceedings of the 20th conference on Large Installation System Administration, pp. 8–16, Usenix Association

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Olivier Savry .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this paper

Cite this paper

Savry, O., Vacherand, F. (2010). Security and Privacy Protection of Contactless Devices. In: Giusto, D., Iera, A., Morabito, G., Atzori, L. (eds) The Internet of Things. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-1674-7_40

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-1674-7_40

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4419-1673-0

  • Online ISBN: 978-1-4419-1674-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics