Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Andrea Soppera is active.

Publication


Featured researches published by Andrea Soppera.


international conference on selected areas in cryptography | 2005

A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags

David Molnar; Andrea Soppera; David A. Wagner

The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the tag attached to it, changes hands during the course of its lifetime. After such an ownership transfer, the new owner should be able to read the tag but the old owner should not. We address these issues through an RFID pseudonym protocol. Each time it is queried, the RFID tag emits a different pseudonym using a pseudo-random function. Without consent of a special Trusted Center that shares secrets with the tag, it is infeasible to map the pseudonym to the tags real identity. We present a scheme for RFID pseudonyms that works with legacy, untrusted readers, requires only one message from tag to reader, and is scalable: decoding tag pseudonyms takes work logarithmic in the number of tags. Our scheme further allows for time-limited delegation, so that we can give an RFID reader the power to disambiguate a limited number of pseudonyms without further help from the Trusted Center. We show how RFID pseudonyms facilitate the transfer of ownership of RFID tags between mutually distrustful parties. Our scheme requires only limited cryptographic functionality from the tag: we need a pseudo-random function (PRF) and the ability to update tag state or to generate random numbers. Tag storage and communication requirements are modest: we give example parameters for a deployment of one million tags in which each tag stores only 128 bits, makes 6 PRF evaluations, and sends 158 bits each time it is read.


workshop on privacy in the electronic society | 2005

Privacy for RFID through trusted computing

David Molnar; Andrea Soppera; David A. Wagner

Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. One of the biggest challenges for RFID technology is to provide privacy protection without raising tag production and management cost. We introduce a new architecture that uses trusted computing primitives to solve this problem. Our design splits the RFID reader into three software modules: a Reader Core with basic functionality, a Policy Engine that controls the use of RFID-derived data, and a Consumer Agent that performs privacy audits on the RFID reader and exports audit results to third party auditors. Readers use remote attestation to prove they are running a specific Reader Core, Policy Engine, and Consumer Agent. As a result, remote attestation allows concerned individuals to verify that RFID readers comply with privacy regulations, while also allowing the reader owner to verify that the reader has not been compromised.Furthermore, industry standards bodies have suggested several mechanisms to protect privacy in which authorized readers use a shared secret to authenticate themselves to the tag. These standards have not fully addressed issues of key management. First, how is the shared secret securely provided to the legitimate reader? Second, how do we guarantee that the reader will comply with a specific privacy policy? We show how, with remote attestation, the key-issuing authority can demand such a proof before releasing shared secrets to the reader. We also show how sealed storage can protect secrets even if the reader is compromised. Finally, we sketch how our design could be implemented today using existing RFID reader hardware.


Lecture Notes in Computer Science | 2003

An Adaptive Method for Dynamic Audience Size Estimation in Multicast

Maziar Nekovee; Andrea Soppera; Trevor Burbridge

We develop an end-to-end protocol for real-time estimation of the size of dynamic multicast groups. Unlike previously proposed methods our approach alleviates feedback implosion in a dynamic setting, and is scalable to large groups. The protocol is based on probabilistic polling combined with adaptive feedback control, and the use of a time-dependent Wiener filter to enhance estimation accuracy. We examine the performance of our protocol through simulations for multicast groups with up to 10,000 members, and different scenarios of group membership dynamics. Our simulation studies show that the method is capable of tracking, in a scalable manner, the size of dynamic multicast groups with high accuracy in the face of large dynamic variations.


Archive | 2005

Event notification network

Maziar Nekovee; Trevor Burbridge; Andrea Soppera


Archive | 2005

Treatment of Data in Networks

Robert John Briscoe; Arnaud Jacquet; Andrea Soppera; Sebastien Cazalet


Archive | 2003

Authentication of network users

Robert John Briscoe; Andrea Soppera


Archive | 2005

Control of Data Exchange

Andrea Soppera; Trevor Burbridge; Vivekanand Korgaonkar


Archive | 2003

Lightweight authentication of information

Andrea Soppera


Archive | 2005

Data network, method and feedback node for assigning and providing path characterisation metrics

Bob Briscoe; Andrea Soppera; Arnaud Jacquet; Sebastien Cazalet


Archive | 2002

Event notification over a communications network

Anargyros Garyfalos; Trevor Burbridge; Andrea Soppera; Robert John Briscoe

Collaboration


Dive into the Andrea Soppera's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alexander Ilic

University of St. Gallen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manfred Aigner

Graz University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge