Privacy threats and issues in mobile RFID From：IEEE Author：Hyangjin Lee, Jeeyeon Kim. Presented by Shih Yu Chen
Introduction • Identify objects and users. • Automatically take advantage of contextual information. • A core technology of ubiquitous infrastructure. • Been applied to many applications.
Applications Retail and supply chain Mobile RFID Homecare Healthcare
Mobile RFID • Use mobile phone as RFID reader. • By integrating RFID and wireless sensor network infrastructure with mobile communication and wireless internet. • Need to exist telecommunication companies between users and enterprise server.
Air Interface RFID tags ……….. RFID Reader …. Gateway Service Provider
Privacy threats in RFID • Location threat *Users *Tagged objects • Preference threat • Constellation threat • Transaction threat
Proposed solution for privacy threats in RFID • Killing and sleeping • Tag password *Verify ok → information • Tag pseudonyms • Encryption • Blocking *Privacy bit：0→public；1→private
Additional privacy threats in mobile RFID • Tag-carrying → Reader-carrying….risk↑ • Mobility *Unlimited collection of personal information. • Seriously location privacy *By mobile phone • Service model of mobile RFID application *B2C
Conclusion • Mobile RFID is a newly promising application. • But , mobility of reader and its service model will cause some additional privacy threats.