Abstract
This paper presents an attractive solution to integrate multiple services in the context of sports associations. The mobile solution is tailored to youngsters and makes use of a contactless RFID chip embedded in a bracelet. It realizes a reasonable trade-off between multiple (often conflicting) requirements, namely low-cost and low-power, security, privacy and flexibility to allow for easily adding new services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication 24(2) (2006)
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of Low-Cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 210–212. Springer, Heidelberg (2004)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain based RFID privacy protection scheme. In: International Conference on Ubiquitous Computing Ubicomp, Workshop Privacy: Current Status and Future Directions, Nottingham, England (September 2004)
Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219. ACM Press, New York (2004)
Hogben, G., Naumann, I.: Privacy features of european eID card specifications. Tech. rep., ENISA (2009)
Institute for Applied Information Processing and Tu Graz Communications: IAIK: JCE-ME, http://jce.iaik.tugraz.at/
Legion of the bouncy castle: The bouncy castle crypto APIs, http://www.bouncycastle.org/
Institute for Applied Information Processing and Tu Graz Communications: Crypto software for microcontrollers, http://jce.iaik.tugraz.at/sic/products/crypto_software_for_microcontrollers
Hoepman, J.-H., Joosten, R.: Practical schemes for privacy & security enhanced rfid. CoRR, vol. abs/0909.1257 (2009)
Pu Public, X., Oswald, E.: Suggested algorithms for light-weight cryptography editor (2006)
Dolev, D., Yao, A.C.: On the security of public key protocols. In: SFCS 1981: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, Washington, DC, USA, pp. 350–357. IEEE Computer Society, Los Alamitos (1981)
Czeskis, A., Koscher, K., Smith, J.R., Kohno, T.: RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, pp. 479–490. ACM, New York (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Vossaert, J., Lapon, J., De Decker, B., Naessens, V. (2010). Personalized Mobile Services with Lightweight Security in a Sports Association. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 47. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17502-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-17502-2_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17501-5
Online ISBN: 978-3-642-17502-2
eBook Packages: Computer ScienceComputer Science (R0)