Categorizing RFID Privacy Threats with STRIDE
Abstract
Privacy threats by radio frequency identification (RFID) are categorized using the security-oriented STRIDE model. Categorizing the privacy threats with STRIDE identifies potential strategies for mitigating them. Preliminary results for preventing tracking using universal re-encryption are presented.
References (12)
- REFERENCES
- Sarma, S. A history of the EPC. RFID: Applications, Security, and Privacy. Garfinkel, S., and Rosenberg, B., Eds. Addison-Wesley, Upper Saddle River, NJ, 2006, 37-55.
- Perrin, S. RFID and global privacy policy. RFID: Applications, Security, and Privacy. Garfinkel, S., and Rosenberg, B., Eds. Addison-Wesley, Upper Saddle River, NJ, 2006, 57-81.
- Thompson, C. Everything is alive. IEEE Internet Computing, (Jan./Feb. 2004).
- Weinberg, J.. RFID, privacy, and regulation. RFID: Applications, Security, and Privacy. Garfinkel, S., and Rosenberg, B., Eds. Addison-Wesley, Upper Saddle River, NJ, 2006, 83-97.
- Chaudhry, N., Thompson, D. R., and Thompson, C. RFID Technical Tutorial and Threat Modeling, ver. 1.0. Technical Report, CSCE Dept., University of Arkansas, Fayetteville, Arkansas, 2005. Available: http://csce.uark.edu/~drt/rfid
- Thompson, D. R., Chaudhry, N., and Thompson, C. W. RFID security threat model. In Proceedings Acxiom Laboratory for Applied Research (ALAR) Conf. Conway, Arkansas, Mar. 3, 2006.
- Karthikeyan, S., and Nesterenko, M. RFID security without expensive cryptography. In Proceedings ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN).
- Alexandria, VA, Nov. 2005, 63-67.
- Howard, M., and LeBlanc, D. Writing Secure Code, 2nd ed. Microsoft Press, Redmond, WA, 2003.
- Langheinrich, M. Privacy by design-Principles of privacy- aware ubiquitous systems. In Proceedings Ubicomp. Atlanta, GA, Oct. 2001.
- Golle, P., Jakosbsson, M, Juels, A., and Syverson, P. Universal re-encryption for mixnets. Lecture Notes in Computer Science, (2004), 163-178.