Abstract
Radio frequency identification (RFID) systems based on low-cost computing devices are small, inexpensive microchips capable of transmitting unique identifiers wirelessly, which make it dramatically increases the ability of the organization to acquire a vast array of data about the location and properties of any entity that can be physically tagged and wirelessly scanned within certain technical limitations. However, its security has been a major project to be focused on for RFID systems. In this paper the “tree-based” technique will be carefully investigated and a multi-tree group method is first discussed and the outcomes of investigations suggest that the overall probability that the whole attack succeeds is sharply dropped.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Huber, G.P.: Organizational Learning: Contributing Processes and the Literatures. Org. Sci. 2(1), 88–115 (1991)
Standford, V.: Pervasive Computing Goes the Last Hundred Feet with RFID Systems. IEEE Perv. Comp. (April–May 2003)
Angeles, R.: RFID Technologies: Supply-Chain Applications and Implementation Issues. Info. Sys. Mgmt., pp. 51–65 (Winter, 2005)
Thompson, C.A.: Radio Frequency Tags for Identifying Legitimate Drug Products Discussed by Tech Industry. Amer. J. Health-Sys. Pharm. 61(14), 1430–1431 (2004)
Yang, G., Jarvenpaa, S.I.: Trust and Radio Frequency Identification (RFID) Adoption within an Alliance. In: Sprague, R. (ed.) Proc. 38th Hawaii Intl. Conff. Sys. Sci., Big Island, HI, January, pp. 855–864. IEEE Comp. Soc. Press, Los. Alamitos (2005)
Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically-enable RFID device. In: 14th USENIX Security Symposium, Baltimore, Maryland, USA, July-August 2005, pp. 1–16. USENIX (2005)
Electronic Product Code Global Inc., http://www.epcglobalinc.org
Avoine, G.: Security and privacy in RFID systems. Online bibliography available at: http://lasecwww.epfl.ch/~gavoine/rfid/
Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Pfitzmann, B., Liu, P. (eds.) Conference on Computer and Communications Security-CCS 2004, Washington, DC, USA, October 2004, pp. 210–219. ACM Press, New York (2004)
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal reencryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)
Henrico, D., Muller, P.: Tacking security and privacy issues in radio frequency identification devices. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001, pp. 219–224. Springer, Heidelberg (2004)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approch to “privacy-friendly” tags. In: RFID Privacy Workshop. MIT, Massachusetts (2003)
Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: International Workshop on Pervasive Computing and Communication Security, PerSec 2005, Kauai Island, Hawaii, USA, March 2005, pp. 110–114. IEEE Computer Society Press, Los Alamitos (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, X., Sharma, D. (2006). Investigating Security in Multi-tree Based Technique in RFID Systems. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4253. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893011_145
Download citation
DOI: https://doi.org/10.1007/11893011_145
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46542-3
Online ISBN: 978-3-540-46544-7
eBook Packages: Computer ScienceComputer Science (R0)