Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Security and privacy on low-cost Radio Frequency Identification systems

Published: 01 March 2010 Publication History

Abstract

Radio Frequency Identification (RFID) systems have already been widely applied in industry supporting supply chain management and inventory control. While the continuation increasing applications of RFID in our daily life, RFID also creates new security and privacy problems to individuals and organisations. This paper focuses on the challenges on security and privacy of low-cost RFID. The security and privacy challenges are analysed after a brief introduction of various RFID systems and their associated operations. A proposal to protecting security and privacy of customers, as a solution of the challenge for low-cost RFID systems is designed. Finally, comparisons to related works of the proposal are described.

References

[1]
Fishkin, K. and Lundell, J. (2005) 'RFID in healthcare', RFID: Applications, Security, and Privacy, pp. 211-228.
[2]
Garfinkel, S.L., Juels, A. and Pappu, R. (2005) 'RFID privacy: an overview of problems and proposed solutions', IEEE Security and Privacy, Vol. 03, No. 3, pp. 34-43.
[3]
Juels, A. and Brainard, J. (2004) 'Soft blocking: flexible blocker tags on the cheap', WPES, ACM, ACM Press, pp. 1-7.
[4]
Juels, A. and Pappu, R. (2003) 'Squealing euros: privacy protection in RFID-enabled banknotes', in Wright, R.N. (Ed.): Financial Cryptography - FC'03, Volume 2742 of Lecture Notes in Computer Science, Le Gosier, Guadeloupe, French West Indies, IFCA, Springer-Verlag, pp. 103-121.
[5]
Juels, A., Rivest, R. and Szydlo, M. (2003) 'The blocker tag: selective blocking of RFID tags for consumer privacy', Consumer Privacy, citeseer.ist.psu.edu/juels03blocker.html
[6]
Krause, M. and Licks, S. (2001) 'On the minimal hardware complexity of pseudorandom function generators', Theoretical Aspects of Computer Science, Volume 2010 of Lecture Notes in Computer Science.
[7]
Ranasinghe, D., Engels, D. and Cole, P. (2001) 'Security and privacy: modest proposals for low-cost rfid systems', Theoretical Aspects of Computer Science, Volume 2010 of Lecture Notes in Computer Science.
[8]
Sarma, S.E., Weis, S.A. and Engels, D.W. (2002) 'RFID systems and security and privacy implications', Workshop on Cryptographic Hardware and Embedded Systems, Volume 2523 of Lecture Notes in Computer Science, pp. 454-470.
[9]
Schuster, E., Allen, S. and Brock, D. (2007) Global RFID: The Value of the EPCglobal Network for Supply Chain Management, illustrated edition, Springer-Verlag, XXVI, 310, p. 33.
[10]
Takaragi, K., Usami, M., Imura, R., Itsuki, R. and Satoh, T. (2001) 'An ultra small individual recognition security chip', IEEE Micro, Vol. 21, No. 6, pp. 43-49.
[11]
Travel, M.R. (2007) Preventing Security and Privacy Attacks on, citeseer.ist.psu.edu/742160.html
[12]
Tsudik, G. (2005) 'Ya-trap: Yet another trivial rfid authentication protocol', Theoretical Aspects of Computer Science, Volume 2010 of Lecture Notes in Computer Science.
[13]
Wang, H., Cao, J. and Zhang, Y. (2005) 'A flexible payment scheme and its role based access control', IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 3, pp. 425-436.
[14]
Wang, H., Cao, J. and Zhang, Y. (2008) 'Access control management for ubiquitous computing', Future Generation Computer Systems journal, Vol. 24, pp. 870-878.
[15]
Weis, S. (2003) Security and Privacy in Radio-frequency Identification Devices, Massachusetts Institute Technology, http://groups.csail.mit.edu/cis/theses/weismasters.pdf
[16]
Weis, S.A., Sarma, S.E., Rivest, R.L. and Engels, D.W. (2004) 'Security and privacy aspects of low-cost radio frequency identification systems', Security in Pervasive Computing, Volume 2802 of Lecture Notes in Computer Science, pp. 201-212.
[17]
Wikipedia (2007) Electronic Product Code, http://en. wikipedia.org/wiki/Electronic_Product_Code
[18]
Wikipedia (2007) 'ISO14443', http://en.wikipedia.org/wiki/ ISO_14443.
[19]
Yeo, S-S. and Kim, S.K. (2005) 'Scalable and flexible privacy protection scheme for RFID systems', 2nd European Workshop on Security in Ad-Hoc and Sensor Networks, Vol. 3813, pp. 153-163.

Cited By

View all
  • (2018)Wireless telemedicine and m-healthInternational Journal of Sensor Networks10.1504/IJSNET.2011.04277010:4(202-236)Online publication date: 27-Dec-2018
  • (2012)A survey of cyber crimesSecurity and Communication Networks10.1002/sec.3315:4(422-437)Online publication date: 1-Apr-2012
  • (2012)A survey of security visualization for computer network logsSecurity and Communication Networks10.1002/sec.3245:4(404-421)Online publication date: 1-Apr-2012
  1. Security and privacy on low-cost Radio Frequency Identification systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image International Journal of Security and Networks
      International Journal of Security and Networks  Volume 5, Issue 2/3
      March 2010
      127 pages
      ISSN:1747-8405
      EISSN:1747-8413
      Issue’s Table of Contents

      Publisher

      Inderscience Publishers

      Geneva 15, Switzerland

      Publication History

      Published: 01 March 2010

      Author Tags

      1. RFID security
      2. low cost RFID
      3. privacy
      4. radio frequency identification

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)Wireless telemedicine and m-healthInternational Journal of Sensor Networks10.1504/IJSNET.2011.04277010:4(202-236)Online publication date: 27-Dec-2018
      • (2012)A survey of cyber crimesSecurity and Communication Networks10.1002/sec.3315:4(422-437)Online publication date: 1-Apr-2012
      • (2012)A survey of security visualization for computer network logsSecurity and Communication Networks10.1002/sec.3245:4(404-421)Online publication date: 1-Apr-2012

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media