Abstract
RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional information and can be used in other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems. Identity-based cryptography can provide encryption and digital signature and convenience in key management compared with traditional certificate-based PKI solution. In this paper, a security management solution for the RFID system is proposed by using identity-based cryptography.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-Key Cryptography for RFID-Tags. In: Proceeding of the 5th International conference on Pervasive Computing and Communications Workshops (2007)
Beak, J., Newmarch, J., Safavi-Naini, R., Susilo, W.: A Survey of Identity-Based Cryptography. In: Proceeding of the 10th Annual Conference for Australian Unix and Open System User Group (AUUG 2004), pp. 95–102 (2004)
Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing Advances in Cryptology. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139. Springer, Heidelberg (2001)
Bono, S., Green, M.,, A.: Security Analysis of a Cryptographically Enabled RFID Device. In: USENIX Security Symposium – Security 2005, pp. 1–16 (2005)
Cocks, C.: An Identity-based Encryptoin Scheme Based on Quadratic Residues. In: Proceeding of 8th IMA International Conference on Cryptography and Coding (2001)
Diffie, W., Hellman, M.: New Direction in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
Inoue, S., Yasuura, H.: RFID privacy using user-controllable uniqueness. In: Proceeding RFID Privacy Workshop (November 2003)
Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Proceeding in the 4th Conference on Security in Communication Networks (2004)
Juels, A.: RFID Security and Privacy: A Research Survey. Selected Areas in Communications, IEEE Journal (2006)
Juels, A.: Strengthening EPC tags against cloning. In: Proceeding in the 6th International Conference on Web Information Systems Engineering (2005)
Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Proc. ACM Conf. Ubiquitous compute Security, pp. 210–219 (2004)
Molnar, D., Soppera, A., Wagner, D.: A scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of FRID Tags. In: The 12th Annual Workshop on Selected Areas in Cryptography. LNCS, Springer, Heidelberg (2005)
Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Tyyls, P., Batina, L.: RFID-tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, Springer, Heidelberg (2006)
NTRU. GenuID, http://www.ntru.com/products/genuid.html
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liang, Y., Rong, C. (2008). RFID System Security Using Identity-Based Cryptography. In: Sandnes, F.E., Zhang, Y., Rong, C., Yang, L.T., Ma, J. (eds) Ubiquitous Intelligence and Computing. UIC 2008. Lecture Notes in Computer Science, vol 5061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69293-5_38
Download citation
DOI: https://doi.org/10.1007/978-3-540-69293-5_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69292-8
Online ISBN: 978-3-540-69293-5
eBook Packages: Computer ScienceComputer Science (R0)