Skip to main content

RFID System with Fairness Within the Framework of Security and Privacy

  • Conference paper
Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3813))

Included in the following conference series:

Abstract

Radio Frequency Identification (RFID) systems are expected to be widely deployed in automated identification and supply-chain applications. Although RFID systems have several advantages, the technology may also create new threats to user privacy. In this paper, we propose the Fair RFID system. This involves improving the security and privacy of existing RFID systems while keeping in line with procedures already accepted by the industrial world. The proposed system enables the protection of users’ privacy from unwanted scanning, and, when necessary, is conditionally traceable to the tag by authorized administrators.

This work was supported by the University IT Research Center Project funded by the Korean Ministry of Information and Communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cachin, C.: On-Line Secret Sharing. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol. 1025, pp. 190–198. Springer, Heidelberg (1995)

    Google Scholar 

  2. Chen, L., Gollmann, D., Mitchell, C.J., Wild, P.: Secret sharing with Reusable Polynomial. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 183–193. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  3. Engels, D.: The Reader Collision Problem. Technical Report. MIT-AUTOID-WH-007, MIT Auto ID Center (2001), Available from http://www.autoidcenter.org

  4. Ewatt, D.M., Hayes, M.: Gillette razors get new edge: RFID tags. Information Week, (January 13, 2003), Available from http://www.informationweek.com

  5. Fedlman, P.: A Practical scheme for Non-interactive Verifiable secret sharing. In: 28th Annual Symposium on the Foundation of Computer Science, pp. 427–437 (1987)

    Google Scholar 

  6. Finkenzeller, K.: RFID Handbook. John Wiley and Sons, Chichester (1999)

    Google Scholar 

  7. Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: 2nd IEEE International Workshop on Pervqsive Computing and Communications Security, PerSec 2005, pp. 110–114. IEEE, Los Alamitos (2005)

    Google Scholar 

  8. Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103–111 (2003)

    Google Scholar 

  11. Kim, S.J., Park, S.J., Won, D.H.: Proxy Signatures, Revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  12. Knospe, H., Pobl, H.: RFID Security. Information Security Technical Report, vol. 9(4), pp. 39-50, Elsevier (2004)

    Google Scholar 

  13. Auto-ID Center, M.I.T. (EPCglobal), http://www.epcglobalinc.org

  14. Ohkubo, M., Suzuki, K., Kinoshita, S.: A Cryptographic Approach to “Privacy-Friendly” tag. In: RFID Privacy Workshop (November 2003), http://www.rfidprivacy.org/

  15. Pedersen, T.P.: A Threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)

    Google Scholar 

  16. Rhee, K.W., Kwak, J., Kim, S.J., Won, D.H.: Challenge-Response Based RFID Authentication Protocols for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Sarma, S.E.: Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center (2001), Available from http://www.autoidcenter.org

  18. Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT (2002)

    Google Scholar 

  19. Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency identification systems. In: Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  20. Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency-identification security risks and challenges. CryptoBytes 6(1) (2003)

    Google Scholar 

  21. Scharfeld, T.: An Analysis of the Fundamental Constraints on Low Cost Passive Radio-Frequency Identification System Design. MS Thesis, Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge, MA 02139 (2001)

    Google Scholar 

  22. Security technology: Where’s the smart money? The Economist, 69–70 (February 9, 2002)

    Google Scholar 

  23. Shamir, A.: How to share a secret. Communication of the ACM 21, 120–126 (1979)

    MathSciNet  Google Scholar 

  24. Tompa, M., Woll, H.: How to share a secret with cheater. Journal of Cryptology 1, 133–138 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  25. Vajda, I., Buttyan, L.: Lightweight Authentication Protocols for Low-Cost RFID Tags. In: 2nd Workshop on Security in Ubiquitous Computing, Ubicomp 2003 (2003)

    Google Scholar 

  26. Weis, S.A.: Radio-frequency identification security and privacy. Master’s thesis, M.I.T (May 2003)

    Google Scholar 

  27. Weis, A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kwak, J., Rhee, K., oh, S., Kim, S., Won, D. (2005). RFID System with Fairness Within the Framework of Security and Privacy. In: Molva, R., Tsudik, G., Westhoff, D. (eds) Security and Privacy in Ad-hoc and Sensor Networks. ESAS 2005. Lecture Notes in Computer Science, vol 3813. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11601494_12

Download citation

  • DOI: https://doi.org/10.1007/11601494_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30912-3

  • Online ISBN: 978-3-540-31615-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics