Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
A Study on RFID Privacy Mechanism using Mobile Phone
Authors: Haedong Lee, Dooho Choi, Sokjoon Lee, Howon Kim
Abstract:
This paper is about hiding RFID tag identifier (ID) using handheld device like a cellular phone. By modifying the tag ID of objects periodically or manually using cellular phone built-in a RFID reader chip or with a external RFID reader device, we can prevent other people from gathering the information related with objects querying information server (like an EPC IS) with a tag ID or deriving the information from tag ID-s code structure or tracking the location of the objects and the owner of the objects. In this paper, we use a cryptographic algorithm for modification and restoring of RFID tag ID, and for one original tag ID, there are several different temporary tag ID, periodically.Keywords: EPC, RFID, Mobile RFID.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1334353
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1807References:
[1] EPCglobal Web site. www.epcglobalinc.org, 2005.
[2] EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz Version 1.0.9 ttp://www.epcglobalinc.org/stan-dards_technology/EPCglobalClass-1Ge neration-2UHFRF-IDProtocolV109.pdf
[3] http://www.ods.or.kr/english/overviewOds.jsp
[4] Nokia unveils RFID phone reader. RFID Journal, 17 March 2004. Available at http://www.r-fidjournal.com/article/view/834/1/13.
[5] Ari Juels. Minimalist cryptography for low-cost RFID tags. In C. Blundo and S. Cimato, editors, Security in Communication Networks (SCN 04), pages 149-164. Springer-Verlag, 2004. LNCS no. 3352.
[6] David Molnar and David Wagner. Privacy and Security in Library RFID : Issues, Practices, and Architectures. In B. Pfitzmann and P. McDaniel, editors, Computer and Communica-tions Security, pages 210 - 219. ACM, 2004.
[7] Ari Juels and Ravikanth Pappu. Squealing euros: Privacy protection in RFID enabled bank-notes. In Rebecca N. Wright, editor, Financial Cryptography - FC-03, volume 2742 of Lecture Notes in Computer Science, pages 103-121, Le Gosier, Guadeloupe, French West In-dies, January 2003. IFCA, Springer-Verlag.
[8] P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal re-encryption for mixnets. In T.Okamoto, editor, CT-RSA -04. Springer-Verlag, 2004.
[9] RFID Journal Frequently Asked Questions, http://www.rfidjournal.com/faq.
[10] Mobile RFID Forum, http://www.mrf.or.kr.
[11] Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Computing, volume 2802 of Lecture Notes in Computer Science, pages 201-212, 2004.
[12] The 5-Cent Challenge. RFID Journal, 30 August 2004. Available at http://www.rfidjou-rnal.com/article/articleview/1100/1/2/.
[13] Test Set for RFID-Enabled Phones. RFID Journal, 20 September 2004. Available at http:// www.rfidjourn-al.com/article/articleview/1125/1/20/.
[14] About the EPCglobal Network™. Available at http://www.epcglobalinc.com/about/about _epc_network.html.
[15] IP4 Portable RFID Reader. Available at http://www.intermec.com/eprise/main/Intermec/C-ontent/Products/Produ cts_ShowDetail?Product=RFID2_IP4
[16] Mobile RFID Forum- Launched. IT Korea Journal March~April 2005, page 61. Available at http://www.ica.or.kr/lib/ITKorea_Eng(0503)/052%20industry%20news. pdf
[17] RSA Laboratories. What is the RSA cryptosystem? Available at http://www.rsasecurity.co-m/ rsalabs/node.asp?id=2214.
[18] Mauro Barni and France Bartolini. Data Hiding for Fighting Piracy. In IEEE Signal Processing Magazine, March 2004, page 28 ~ 39.
[19] Stephan J. Engberg, Morten B. Harning, Christian Damsgaard Jensen. Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience, In Proceeding of PST 2004, page 89~100.