Andrea Soppera
BT Group
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Andrea Soppera.
international conference on selected areas in cryptography | 2005
David Molnar; Andrea Soppera; David A. Wagner
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the tag attached to it, changes hands during the course of its lifetime. After such an ownership transfer, the new owner should be able to read the tag but the old owner should not. We address these issues through an RFID pseudonym protocol. Each time it is queried, the RFID tag emits a different pseudonym using a pseudo-random function. Without consent of a special Trusted Center that shares secrets with the tag, it is infeasible to map the pseudonym to the tags real identity. We present a scheme for RFID pseudonyms that works with legacy, untrusted readers, requires only one message from tag to reader, and is scalable: decoding tag pseudonyms takes work logarithmic in the number of tags. Our scheme further allows for time-limited delegation, so that we can give an RFID reader the power to disambiguate a limited number of pseudonyms without further help from the Trusted Center. We show how RFID pseudonyms facilitate the transfer of ownership of RFID tags between mutually distrustful parties. Our scheme requires only limited cryptographic functionality from the tag: we need a pseudo-random function (PRF) and the ability to update tag state or to generate random numbers. Tag storage and communication requirements are modest: we give example parameters for a deployment of one million tags in which each tag stores only 128 bits, makes 6 PRF evaluations, and sends 158 bits each time it is read.
workshop on privacy in the electronic society | 2005
David Molnar; Andrea Soppera; David A. Wagner
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. One of the biggest challenges for RFID technology is to provide privacy protection without raising tag production and management cost. We introduce a new architecture that uses trusted computing primitives to solve this problem. Our design splits the RFID reader into three software modules: a Reader Core with basic functionality, a Policy Engine that controls the use of RFID-derived data, and a Consumer Agent that performs privacy audits on the RFID reader and exports audit results to third party auditors. Readers use remote attestation to prove they are running a specific Reader Core, Policy Engine, and Consumer Agent. As a result, remote attestation allows concerned individuals to verify that RFID readers comply with privacy regulations, while also allowing the reader owner to verify that the reader has not been compromised.Furthermore, industry standards bodies have suggested several mechanisms to protect privacy in which authorized readers use a shared secret to authenticate themselves to the tag. These standards have not fully addressed issues of key management. First, how is the shared secret securely provided to the legitimate reader? Second, how do we guarantee that the reader will comply with a specific privacy policy? We show how, with remote attestation, the key-issuing authority can demand such a proof before releasing shared secrets to the reader. We also show how sealed storage can protect secrets even if the reader is compromised. Finally, we sketch how our design could be implemented today using existing RFID reader hardware.
Lecture Notes in Computer Science | 2003
Maziar Nekovee; Andrea Soppera; Trevor Burbridge
We develop an end-to-end protocol for real-time estimation of the size of dynamic multicast groups. Unlike previously proposed methods our approach alleviates feedback implosion in a dynamic setting, and is scalable to large groups. The protocol is based on probabilistic polling combined with adaptive feedback control, and the use of a time-dependent Wiener filter to enhance estimation accuracy. We examine the performance of our protocol through simulations for multicast groups with up to 10,000 members, and different scenarios of group membership dynamics. Our simulation studies show that the method is capable of tracking, in a scalable manner, the size of dynamic multicast groups with high accuracy in the face of large dynamic variations.
Archive | 2005
Maziar Nekovee; Trevor Burbridge; Andrea Soppera
Archive | 2005
Robert John Briscoe; Arnaud Jacquet; Andrea Soppera; Sebastien Cazalet
Archive | 2003
Robert John Briscoe; Andrea Soppera
Archive | 2005
Andrea Soppera; Trevor Burbridge; Vivekanand Korgaonkar
Archive | 2003
Andrea Soppera
Archive | 2005
Bob Briscoe; Andrea Soppera; Arnaud Jacquet; Sebastien Cazalet
Archive | 2002
Anargyros Garyfalos; Trevor Burbridge; Andrea Soppera; Robert John Briscoe