Abstract
Radio Frequency Identification (RFID) systems are expected to be widely deployed in automated identification and supply-chain applications. Although RFID systems have several advantages, the technology may also create new threats to user privacy. In this paper, we propose the Fair RFID system. This involves improving the security and privacy of existing RFID systems while keeping in line with procedures already accepted by the industrial world. The proposed system enables the protection of users’ privacy from unwanted scanning, and, when necessary, is conditionally traceable to the tag by authorized administrators.
This work was supported by the University IT Research Center Project funded by the Korean Ministry of Information and Communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cachin, C.: On-Line Secret Sharing. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol. 1025, pp. 190–198. Springer, Heidelberg (1995)
Chen, L., Gollmann, D., Mitchell, C.J., Wild, P.: Secret sharing with Reusable Polynomial. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 183–193. Springer, Heidelberg (1997)
Engels, D.: The Reader Collision Problem. Technical Report. MIT-AUTOID-WH-007, MIT Auto ID Center (2001), Available from http://www.autoidcenter.org
Ewatt, D.M., Hayes, M.: Gillette razors get new edge: RFID tags. Information Week, (January 13, 2003), Available from http://www.informationweek.com
Fedlman, P.: A Practical scheme for Non-interactive Verifiable secret sharing. In: 28th Annual Symposium on the Foundation of Computer Science, pp. 427–437 (1987)
Finkenzeller, K.: RFID Handbook. John Wiley and Sons, Chichester (1999)
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: 2nd IEEE International Workshop on Pervqsive Computing and Communications Security, PerSec 2005, pp. 110–114. IEEE, Los Alamitos (2005)
Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)
Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103–111 (2003)
Kim, S.J., Park, S.J., Won, D.H.: Proxy Signatures, Revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)
Knospe, H., Pobl, H.: RFID Security. Information Security Technical Report, vol. 9(4), pp. 39-50, Elsevier (2004)
Auto-ID Center, M.I.T. (EPCglobal), http://www.epcglobalinc.org
Ohkubo, M., Suzuki, K., Kinoshita, S.: A Cryptographic Approach to “Privacy-Friendly” tag. In: RFID Privacy Workshop (November 2003), http://www.rfidprivacy.org/
Pedersen, T.P.: A Threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)
Rhee, K.W., Kwak, J., Kim, S.J., Won, D.H.: Challenge-Response Based RFID Authentication Protocols for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)
Sarma, S.E.: Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center (2001), Available from http://www.autoidcenter.org
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT (2002)
Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency identification systems. In: Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2002)
Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency-identification security risks and challenges. CryptoBytes 6(1) (2003)
Scharfeld, T.: An Analysis of the Fundamental Constraints on Low Cost Passive Radio-Frequency Identification System Design. MS Thesis, Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge, MA 02139 (2001)
Security technology: Where’s the smart money? The Economist, 69–70 (February 9, 2002)
Shamir, A.: How to share a secret. Communication of the ACM 21, 120–126 (1979)
Tompa, M., Woll, H.: How to share a secret with cheater. Journal of Cryptology 1, 133–138 (1988)
Vajda, I., Buttyan, L.: Lightweight Authentication Protocols for Low-Cost RFID Tags. In: 2nd Workshop on Security in Ubiquitous Computing, Ubicomp 2003 (2003)
Weis, S.A.: Radio-frequency identification security and privacy. Master’s thesis, M.I.T (May 2003)
Weis, A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwak, J., Rhee, K., oh, S., Kim, S., Won, D. (2005). RFID System with Fairness Within the Framework of Security and Privacy. In: Molva, R., Tsudik, G., Westhoff, D. (eds) Security and Privacy in Ad-hoc and Sensor Networks. ESAS 2005. Lecture Notes in Computer Science, vol 3813. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11601494_12
Download citation
DOI: https://doi.org/10.1007/11601494_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30912-3
Online ISBN: 978-3-540-31615-2
eBook Packages: Computer ScienceComputer Science (R0)