Skip to main content

Privacy Protection Scheme of RFID Using Random Number

  • Conference paper
Emerging Technologies in Knowledge Discovery and Data Mining (PAKDD 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4819))

Included in the following conference series:

  • 1519 Accesses

Abstract

With the development in IT technology and with the growing demands of users, a ubiquitous environment is being made. Ubiquitous stands for a convenient environment in which users can get information and services through networks with devices that can communicate. This ubiquitous environment requires device technology, and Radio Frequency IDentification(RFID) is a good example. RFID, a technology that identifies radio frequency, was developed to substitute bar-codes and has various strengths, such as high recognition rates, quick recognition speed, and large storage. Because of these strengths, it is being used in various fields such as the public, distribution, and financial sectors; but it has a weakness in privacy, as readers operating within the same frequency bandwidth can be easily tagged. By acquiring information from the tag, unauthorized people can assess into the personal information of users. The current study, therefore, provides a secure and effective protection method, which can guarantee anonymity towards users with tags.

“This work was supported by the Korea Research Foundation Grant funded by the Korean Government(MOEHRD)” (KRF-2006-311-D00851).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for radio-frequency identification devices using varying identifiers. In: IEEE International Workshop on Pervasive Computing and Communication Security PerSec, pp. 149–153 (2004)

    Google Scholar 

  2. Vajda, I., Butty’an, L.: Lightweight authentication protocols for low-cost RFID tags. In: 2nd Workshop on Security in Ubiquitous Computing (2003)

    Google Scholar 

  3. Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Ecrypt Workshop (2005)

    Google Scholar 

  4. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, Springer, Heidelberg (2004)

    Google Scholar 

  5. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to ‘privacy-friendly’ tags. In: RFID Privacy Workshop (2003)

    Google Scholar 

  6. Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., Ribagorda, A.: EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags. In: OTM Federated Conferences and Workshop: IS Workshop (2006)

    Google Scholar 

  7. Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., Ribagorda, A.: LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags. In: Workshop on RFID Security (2006)

    Google Scholar 

  8. Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., Ribagorda, A.: M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Sarma, S., Weis, S., Engels, D.: Radio-frequency identification: security risks and challenges, Cryptobytes, RSA Laboratories, pp. 2–9 (2003)

    Google Scholar 

  10. Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: International Conference on Security in Pervasive Computing SPC, pp. 454–469 (2003)

    Google Scholar 

  11. Weis, S.: Security and privacy in radio-frequency identification devices, Masters Thesis, MIT (2003)

    Google Scholar 

  12. Lee, S.-M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient authentication for low-cost RFID systems. In: International Conference on Computational Science and its Applications - ICCSA, pp. 619–627 (2005)

    Google Scholar 

  13. Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Conference on Security and Privacy for Emerging Areas in Communication Networks SecureComm (2005)

    Google Scholar 

  14. Weis, S.: Security Parallels Between People and Pervasive Devices. In: Workshop on Pervasive Computing and Communications Security - PerSec (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Takashi Washio Zhi-Hua Zhou Joshua Zhexue Huang Xiaohua Hu Jinyan Li Chao Xie Jieyue He Deqing Zou Kuan-Ching Li Mário M. Freire

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, SY., Lee, IY. (2007). Privacy Protection Scheme of RFID Using Random Number. In: Washio, T., et al. Emerging Technologies in Knowledge Discovery and Data Mining. PAKDD 2007. Lecture Notes in Computer Science(), vol 4819. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77018-3_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77018-3_59

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77016-9

  • Online ISBN: 978-3-540-77018-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics