Abstract
The use of RFID tags (radio-frequency identification tags) in banknotes presents a main challenge that may discourage their usage: how to avoid a possible attacker to count the amount of tags. Such a drawback is faced in this paper by designing an appropriate Medium Access Control (MAC) for this scenario. A MAC is the set of mechanisms and protocols that allows devices to share the communication channel. In a RFID system, a MAC protocol makes it possible for several tags to communicate within a common environment with the RFID reader. In this paper, we present a new MAC protocol that is suitable for ensuring security in the use of RFID-enabled banknotes. It also guarantees privacy and fits scalability requirements when the number of tags is increasing.
This work was supported by the Generalitat de Catalunya with a Grant FIC, and the projects of the Spanish MCyT TIN2006-15662-C02-02 and MTM2007-66842-C02-02.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)
Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The Evolution of RFID Security. IEEE Pervasive Computing 5(1), 62–69 (2006)
Choi, E.Y., Lee, S.M., Lee, D.H.: Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 1171–1180. Springer, Heidelberg (2007)
Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)
Kinoshita, S., Hoshino, F., Komuro, T., Fujimura, A., Ohkubo, M.: Nonidentifiable Anonymous-ID Scheme for RFID Privacy Protection. Joho Shori Gakkai Shinpojiumu Ronbunshu CSS (15), 497–502 (2003) (in Japanese)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 454–469. Springer, Heidelberg (2004)
Castelluccia, C., Avoine, G.: Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 289–299. Springer, Heidelberg (2006)
Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Atluri, V. (ed.) Conference on Computer and Communications Security – ACM CCS, Washington, DC, USA, October 2003, pp. 103–111. ACM Press, New York (2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to “Privacy-Friendly” Tags. In: RFID Privacy Workshop (2003)
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: International Workshop on Pervasive Computing and Communication Security – PerSec, pp. 110–114. IEEE Computer Society Press, Los Alamitos (2005)
Martínez, S., Valls, M., Roig, C., Miret, J.M., Giné, F.: A Secure Elliptic Curve-Based RFID Protocol. Journal of Computer Science and Technology 24(2), 309–318 (2009)
Floerkemeier, C., Wille, M.: Comparison of Transmission Schemes for Framed ALOHA based RFID Protocols. In: International Symposium on Applications and the Internet Workshops – SAINTW, pp. 92–97. IEEE Computer Society Press, Los Alamitos (2006)
Khandelwal, G., Yener, A., Lee, K., Serbetli, S.: ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems. In: IEEE International Conference on Communications – ICC, vol. 9, pp. 4028–4033 (2007)
Waldrop, J., Engels, D.W., Sarma, S.E.: Colorwave: A MAC for RFID Reader Networks. Wireless Communications and Networking 3, 1701–1704 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Martínez, S., Roig, C., Valls, M. (2010). Securing the Use of RFID-Enabled Banknotes. In: Sion, R., et al. Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6054. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14992-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-14992-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14991-7
Online ISBN: 978-3-642-14992-4
eBook Packages: Computer ScienceComputer Science (R0)