Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Resulting from the pressure of cost and the physical manifestation (e.g. small size) the overall resources in terms of energy, storage and computing power available to the RFID are very limited. This makes a simple adoption of well known and studied PETs (Privacy-Enhancing Technologies) which are used in the world of “normal” computers and networks infeasible. Looking for instance at cryptography related solutions, it turns out that many of them tend to have the same problems: the capacity of the cheap tags is too low to apply strong security mechanisms (key sizes are too short, random number generators are not available or do not produce truly random numbers, etc.); the key management is unsolved: how to manage the keys for some millions of things like banknotes, cars, milk-bottles, etc.?
One way of reducing the costs when producing RFID tags is to rather produce some kind of “general purpose” RFID tag than developing and producing more specialised (or tailored) RFID tags for a given use case. This “general purpose” capability of an RFID tag might sometimes be “hidden” as the producers will “deactivate” some of the functions of the “general purpose” RFID tags to sell them as “special purpose” (i.e. tailored) RFID tags. History teaches that often such things could be “converted back” into “general purpose” ones. One example of negative impact this might have in the area of security is that one can expect that RFID tags in general will not only be readable but also writeable. Moreover the range of RFID transmissions might be greater than necessary for the given area of application of RFID technology etc.
Many of the proposed solutions for privacy enhanced RFID technologies concentrate on one of the three main layers (physical, network or application layer), but a solution on one layer may be countervailed by an attack on another layer (e.g. pseudonyms on the application layer vs. traceability on the physical layer). Therefore a holistic privacy framework for RFID has to incorporate a multi-layer approach.
Moreover after “solving” the privacy problems the RFID related research and development can continue to go on in technology directions which are mostly counterproductive for privacy like enhancing the range of RFID tags, enhancing the transmission speed, enhancing of the capability to read a huge number of RFID tags simultaneously, reduction of the vulnerability to failures through environmental influences (like metal or water, jamming signals etc.). The latter even includes the consideration of the requirements of RFID technologies when planning new buildings. It is likely that our surroundings will be planned and implemented “RFID-compatible” within the next decades.
Eventually the term “RFID” subsumes all kinds of different technologies with very different capabilities, conditions and prerequisites. Moreover it seems to be very difficult to draw a clear line between what belongs to RFID and what not. Resulting from the huge range of different technologies and areas of application involved it seems to be very hard to develop a common holistic privacy framework, which covers the whole spectrum of technologies and applications used.
23 / 38 |