You are here: Resources > FIDIS Deliverables > HighTechID > D12.3: A Holistic Privacy Framework for RFID Applications > 
Technical approaches to privacy friendliness  Title:
THE SLEEP-COMMAND
 Blocking

 

The Sleep-Command

A way to temporarily disable tags is putting them to sleep . A reader provides a tag with a hashed value of a key: meta-id=hash(key). This provision must take place securely, e.g. by physical contact. After a tag received a meta-id, it is in a sleep mode, replying to requests with its meta-id. In order to wake a tag up, the reader has to send the key to the tag, which builds the hash of this value and compares it with the stored meta-id. Upon a match the tag is “awake” again and can provide the reader with the requested information.

The main problems with this concept are that it is very hard to convince the user that a tag really was sent to sleep. Furthermore, the key is sent in clear-text to the tag. Other problems arise in terms of traceability. A sleeping tag answers all requests with its meta-id, so it can be tracked by this information.

Figure 5 shows an example scenario where putting tags to sleep could be used. Assume that the goods at a supermarket are equipped with RFID-tags. At the cash point, the tags are put to sleep, by providing them the proper secret. The secret has to be stored in a database together with the products when they enter the store. The secrets for all purchased products are given to the customer. Maybe some kind of “PrivacyCard” exists, like depictured in the illustration below. The cash point could provide the needed data to this card. The user then can activate the tags by using the secrets stored at his personal PrivacyCard. So the tags could be used for the smart fridge, but on the way home, no one could scan the contents of user’s shopping bag. 


Figure 5: Supermarket example for putting a tag to sleep

Problematic is, that the user cannot be sure that the supermarket does not keep the secrets it handed out to the customer. Furthermore, this scheme requires user interaction. But in a world of discount cards a PrivacyCard could be well adopted by the consumers, or the PrivacyCard functionality could be integrated in discount cards from the beginning. 

In an enhanced “sleep-version” is introduced, called “Randomized Access Control”. Here, the tag responses to a request with a random number r and a value h=hash(r || id). The reader has to search its database in a brute-force fashion to find the corresponding id. It is obvious, that this scheme is only applicable in a system with relatively few tags; else the search for the id would take too much time. Another problem is that tags have to implement a random number generator which produces good random numbers.

 

Technical approaches to privacy friendliness  fidis-wp12-d12.3_Holistic_Privacy_Framework_for_RFID_Applications.sxw  Blocking
32 / 38