Abstract
The RFID (Radio Frequency Identification) technology has drawn much attention for not only its efficiency in inventory and production management, such as WMS, ERP, but also its significant potential for improving our daily lives. Also mobile phone combined RFID reader will popular and widely using device in our ubiquitous society. Mobile RFID technology holds great promise, but it also raises significant security and privacy concerns for the ubiquitous world. This paper suggests a new architecture for mobile RFID service, which support secure RFID service and uses the privacy aware access control for collection or gathering of tagged information in RFID system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jin, S., et al.: Cluster-based Trust Evaluation Scheme in Ad Hoc Network. ETRI Journal 27(4) (2005)
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications Technical Report MIT-AUTOID-WH-014, AutoID Center. MIT, Cambridge (2002)
Weis, S., et al.: Security and Privacy Aspects of Low-Cost Radio Frequency identification Systems. In: First Intern. Conference on Security in Pervasive Computing (SPC) (2003)
Han, W., et al.: A Gateway and Framework for Telematics Systems Independent on Mobile Networks. ETRI Journal 27(2) (2005)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-Friendly Tags. In: RFID Privacy Workshop (2003)
Hennig, J.E., Ladkin, P.B., Sieker, B.: Privacy Enhancing Technology Concepts for RFID Technology Scrutinised, RVS-RR-04-02, October 28 (2004)
Garfinkel, S., Rosenberg, B.: RFID Applications, Security, and Privacy. Addison-Wesley, Reading (2005)
Stephen, A., et al.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Sarma, S.E., et al.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, B., Kim, H. (2005). Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_69
Download citation
DOI: https://doi.org/10.1007/11596981_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)