Usability of Display-Equipped RFID Tags for Security Purposes View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2011

AUTHORS

Alfred Kobsa , Rishab Nithyanand , Gene Tsudik , Ersin Uzun

ABSTRACT

The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult security issues, certain important usability-related issues remain, particularly when RFID tags are used for financial transactions or for bearer identification.In this paper, we focus exclusively on techniques with user involvement for secure user-to-tag authentication, transaction verification, reader expiration and revocation checking, as well as association of RFID tags with other personal devices. Our approach is based on two factors: (1) recent advances in hardware and manufacturing have made it possible to mass-produce inexpensive passive display-equipped RFID tags, and (2) high-end RFID tags used in financial transactions or identification are usually attended by a human user (namely the owner). Our techniques rely on user involvement coupled with on-tag displays to achieve better security and privacy. Since user acceptance is a crucial factor in this context, we thoroughly evaluate the usability of all considered methods through comprehensive user studies and report on our findings. More... »

PAGES

434-451

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-23822-2_24

DOI

http://dx.doi.org/10.1007/978-3-642-23822-2_24

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1006656724


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of California, Irvine, CA, USA", 
          "id": "http://www.grid.ac/institutes/grid.266093.8", 
          "name": [
            "University of California, Irvine, CA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kobsa", 
        "givenName": "Alfred", 
        "id": "sg:person.011535476711.56", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011535476711.56"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Stony Brook University, NY, USA", 
          "id": "http://www.grid.ac/institutes/grid.36425.36", 
          "name": [
            "Stony Brook University, NY, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Nithyanand", 
        "givenName": "Rishab", 
        "id": "sg:person.010452732116.24", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010452732116.24"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of California, Irvine, CA, USA", 
          "id": "http://www.grid.ac/institutes/grid.266093.8", 
          "name": [
            "University of California, Irvine, CA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tsudik", 
        "givenName": "Gene", 
        "id": "sg:person.010163627407.49", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010163627407.49"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Palo Alto Research Center, CA, USA", 
          "id": "http://www.grid.ac/institutes/grid.482243.b", 
          "name": [
            "Palo Alto Research Center, CA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Uzun", 
        "givenName": "Ersin", 
        "id": "sg:person.016065225667.49", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016065225667.49"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2011", 
    "datePublishedReg": "2011-01-01", 
    "description": "The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult security issues, certain important usability-related issues remain, particularly when RFID tags are used for financial transactions or for bearer identification.In this paper, we focus exclusively on techniques with user involvement for secure user-to-tag authentication, transaction verification, reader expiration and revocation checking, as well as association of RFID tags with other personal devices. Our approach is based on two factors: (1) recent advances in hardware and manufacturing have made it possible to mass-produce inexpensive passive display-equipped RFID tags, and (2) high-end RFID tags used in financial transactions or identification are usually attended by a human user (namely the owner). Our techniques rely on user involvement coupled with on-tag displays to achieve better security and privacy. Since user acceptance is a crucial factor in this context, we thoroughly evaluate the usability of all considered methods through comprehensive user studies and report on our findings.", 
    "editor": [
      {
        "familyName": "Atluri", 
        "givenName": "Vijay", 
        "type": "Person"
      }, 
      {
        "familyName": "Diaz", 
        "givenName": "Claudia", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-23822-2_24", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-23821-5", 
        "978-3-642-23822-2"
      ], 
      "name": "Computer Security \u2013 ESORICS 2011", 
      "type": "Book"
    }, 
    "keywords": [
      "RFID tags", 
      "high-end RFID tags", 
      "usability-related issues", 
      "public key operations", 
      "user involvement", 
      "public key cryptography", 
      "difficult security issues", 
      "comprehensive user study", 
      "financial transactions", 
      "revocation checking", 
      "secure user", 
      "transaction verification", 
      "tag authentication", 
      "key cryptography", 
      "human users", 
      "better security", 
      "security issues", 
      "personal devices", 
      "security purposes", 
      "user study", 
      "user acceptance", 
      "key operations", 
      "usability", 
      "users", 
      "security", 
      "new applications", 
      "transactions", 
      "tags", 
      "authentication", 
      "cryptography", 
      "privacy", 
      "hardware", 
      "checking", 
      "commerce", 
      "verification", 
      "recent emergence", 
      "issues", 
      "technique", 
      "applications", 
      "display", 
      "recent advances", 
      "operation", 
      "devices", 
      "manufacturing", 
      "crucial factor", 
      "context", 
      "identification", 
      "method", 
      "advances", 
      "acceptance", 
      "number", 
      "use", 
      "purpose", 
      "emergence", 
      "factors", 
      "expiration", 
      "study", 
      "findings", 
      "involvement", 
      "association", 
      "paper", 
      "approach", 
      "certain important usability-related issues", 
      "important usability-related issues", 
      "bearer identification", 
      "reader expiration", 
      "mass-produce inexpensive passive display-equipped RFID tags", 
      "inexpensive passive display-equipped RFID tags", 
      "passive display-equipped RFID tags", 
      "display-equipped RFID tags", 
      "tag displays", 
      "Display-Equipped RFID Tags"
    ], 
    "name": "Usability of Display-Equipped RFID Tags for Security Purposes", 
    "pagination": "434-451", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1006656724"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-23822-2_24"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-23822-2_24", 
      "https://app.dimensions.ai/details/publication/pub.1006656724"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-11-01T18:49", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211101/entities/gbq_results/chapter/chapter_181.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-23822-2_24"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-23822-2_24'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-23822-2_24'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-23822-2_24'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-23822-2_24'


 

This table displays all metadata directly associated to this object as RDF triples.

168 TRIPLES      23 PREDICATES      99 URIs      91 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-23822-2_24 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 anzsrc-for:0806
4 schema:author Nb37ac6df484d4a25befc281368b012dc
5 schema:datePublished 2011
6 schema:datePublishedReg 2011-01-01
7 schema:description The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult security issues, certain important usability-related issues remain, particularly when RFID tags are used for financial transactions or for bearer identification.In this paper, we focus exclusively on techniques with user involvement for secure user-to-tag authentication, transaction verification, reader expiration and revocation checking, as well as association of RFID tags with other personal devices. Our approach is based on two factors: (1) recent advances in hardware and manufacturing have made it possible to mass-produce inexpensive passive display-equipped RFID tags, and (2) high-end RFID tags used in financial transactions or identification are usually attended by a human user (namely the owner). Our techniques rely on user involvement coupled with on-tag displays to achieve better security and privacy. Since user acceptance is a crucial factor in this context, we thoroughly evaluate the usability of all considered methods through comprehensive user studies and report on our findings.
8 schema:editor N316d2d782be644129e8d51f7a61e0f95
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree true
12 schema:isPartOf Na1d333eeb32f410981239f3d734a69d8
13 schema:keywords Display-Equipped RFID Tags
14 RFID tags
15 acceptance
16 advances
17 applications
18 approach
19 association
20 authentication
21 bearer identification
22 better security
23 certain important usability-related issues
24 checking
25 commerce
26 comprehensive user study
27 context
28 crucial factor
29 cryptography
30 devices
31 difficult security issues
32 display
33 display-equipped RFID tags
34 emergence
35 expiration
36 factors
37 financial transactions
38 findings
39 hardware
40 high-end RFID tags
41 human users
42 identification
43 important usability-related issues
44 inexpensive passive display-equipped RFID tags
45 involvement
46 issues
47 key cryptography
48 key operations
49 manufacturing
50 mass-produce inexpensive passive display-equipped RFID tags
51 method
52 new applications
53 number
54 operation
55 paper
56 passive display-equipped RFID tags
57 personal devices
58 privacy
59 public key cryptography
60 public key operations
61 purpose
62 reader expiration
63 recent advances
64 recent emergence
65 revocation checking
66 secure user
67 security
68 security issues
69 security purposes
70 study
71 tag authentication
72 tag displays
73 tags
74 technique
75 transaction verification
76 transactions
77 usability
78 usability-related issues
79 use
80 user acceptance
81 user involvement
82 user study
83 users
84 verification
85 schema:name Usability of Display-Equipped RFID Tags for Security Purposes
86 schema:pagination 434-451
87 schema:productId N7a9d23e3426640bdbcf6532d8a8e2288
88 Nab0ede6418504eeb9ae53c1142524958
89 schema:publisher N47a7ee19412f497f81c5c7c84856ad45
90 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006656724
91 https://doi.org/10.1007/978-3-642-23822-2_24
92 schema:sdDatePublished 2021-11-01T18:49
93 schema:sdLicense https://scigraph.springernature.com/explorer/license/
94 schema:sdPublisher N05af7424bfd34631b154a51b15837e63
95 schema:url https://doi.org/10.1007/978-3-642-23822-2_24
96 sgo:license sg:explorer/license/
97 sgo:sdDataset chapters
98 rdf:type schema:Chapter
99 N05af7424bfd34631b154a51b15837e63 schema:name Springer Nature - SN SciGraph project
100 rdf:type schema:Organization
101 N27f14f24da5f497bb57d4f8c00bfc884 rdf:first N30e046186a6b4f64b0d8abd6672ce235
102 rdf:rest rdf:nil
103 N30e046186a6b4f64b0d8abd6672ce235 schema:familyName Diaz
104 schema:givenName Claudia
105 rdf:type schema:Person
106 N316d2d782be644129e8d51f7a61e0f95 rdf:first Nd5ae60302823445fb9c798ca2c71a5be
107 rdf:rest N27f14f24da5f497bb57d4f8c00bfc884
108 N47a7ee19412f497f81c5c7c84856ad45 schema:name Springer Nature
109 rdf:type schema:Organisation
110 N7a9d23e3426640bdbcf6532d8a8e2288 schema:name dimensions_id
111 schema:value pub.1006656724
112 rdf:type schema:PropertyValue
113 Na1d333eeb32f410981239f3d734a69d8 schema:isbn 978-3-642-23821-5
114 978-3-642-23822-2
115 schema:name Computer Security – ESORICS 2011
116 rdf:type schema:Book
117 Nab0ede6418504eeb9ae53c1142524958 schema:name doi
118 schema:value 10.1007/978-3-642-23822-2_24
119 rdf:type schema:PropertyValue
120 Nb14021ee4049408190ae7a0ddbcd8ce1 rdf:first sg:person.016065225667.49
121 rdf:rest rdf:nil
122 Nb37ac6df484d4a25befc281368b012dc rdf:first sg:person.011535476711.56
123 rdf:rest Ndd03359ee4c84d46bfb6b23d87d3a3d0
124 Nd5ae60302823445fb9c798ca2c71a5be schema:familyName Atluri
125 schema:givenName Vijay
126 rdf:type schema:Person
127 Ndd03359ee4c84d46bfb6b23d87d3a3d0 rdf:first sg:person.010452732116.24
128 rdf:rest Ndfe0b6043af640f9acb23362032f5e3e
129 Ndfe0b6043af640f9acb23362032f5e3e rdf:first sg:person.010163627407.49
130 rdf:rest Nb14021ee4049408190ae7a0ddbcd8ce1
131 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
132 schema:name Information and Computing Sciences
133 rdf:type schema:DefinedTerm
134 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
135 schema:name Data Format
136 rdf:type schema:DefinedTerm
137 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
138 schema:name Information Systems
139 rdf:type schema:DefinedTerm
140 sg:person.010163627407.49 schema:affiliation grid-institutes:grid.266093.8
141 schema:familyName Tsudik
142 schema:givenName Gene
143 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010163627407.49
144 rdf:type schema:Person
145 sg:person.010452732116.24 schema:affiliation grid-institutes:grid.36425.36
146 schema:familyName Nithyanand
147 schema:givenName Rishab
148 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010452732116.24
149 rdf:type schema:Person
150 sg:person.011535476711.56 schema:affiliation grid-institutes:grid.266093.8
151 schema:familyName Kobsa
152 schema:givenName Alfred
153 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011535476711.56
154 rdf:type schema:Person
155 sg:person.016065225667.49 schema:affiliation grid-institutes:grid.482243.b
156 schema:familyName Uzun
157 schema:givenName Ersin
158 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016065225667.49
159 rdf:type schema:Person
160 grid-institutes:grid.266093.8 schema:alternateName University of California, Irvine, CA, USA
161 schema:name University of California, Irvine, CA, USA
162 rdf:type schema:Organization
163 grid-institutes:grid.36425.36 schema:alternateName Stony Brook University, NY, USA
164 schema:name Stony Brook University, NY, USA
165 rdf:type schema:Organization
166 grid-institutes:grid.482243.b schema:alternateName Palo Alto Research Center, CA, USA
167 schema:name Palo Alto Research Center, CA, USA
168 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...