Skip to main content

Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3983))

Included in the following conference series:

Abstract

Most RFID (Radio Fequency IDentification) Tag security schemes assumed that the backward channel from tags to a reader is safe from eavesdropping. However, eavesdroppers near a tag can overhear message from the tag illegally. This may cause some privacy issues because the backward channel eavesdropping means the expose of personal information related to the tags that each person has. In this paper, we propose a method to protect the backward channel from eavesdropping by illegal readers. The proposed scheme can overcome the problems of conventional schemes based on tree-walking algorithm. It is shown that the proposed method can provide the probability of eavesdropping in some standardized RFID tag system such as EPCglobal, ISO, uCode near to ’0’.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jacomet, M., Ehrsam, A., Gehrig, U.: Contactless Identification Device With Anticollision Algorithm. In: IEEE CSCC 1999, Athens, Greece (July 1999)

    Google Scholar 

  2. Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices, Masters Thesis. MIT (May 2003)

    Google Scholar 

  3. EPC global: EPCTM Tag Data Standards Version 1.1 Rev.1.24, Standard Specification (April 2004)

    Google Scholar 

  4. ISO/IEC 15459: Information technology - Unique identifiers for item management (1999)

    Google Scholar 

  5. Ken, S.: Ubiquitous ID Center has authorized 2 types of RFID chips mady by Fujitsu as the Standard ucode tag, uID Center (December 2004)

    Google Scholar 

  6. EPCglobal: EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz, Version 1.0.9 (Janaury 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, W., Roh, Bh. (2006). Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_30

Download citation

  • DOI: https://doi.org/10.1007/11751632_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34077-5

  • Online ISBN: 978-3-540-34078-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics