A Study on RFID Privacy Mechanism using Mobile Phone

نویسندگان

  • Haedong Lee
  • Dooho Choi
  • Sokjoon Lee
  • Howon Kim
چکیده

This paper is about hiding RFID tag identifier (ID) using handheld device like a cellular phone. By modifying the tag ID of objects periodically or manually using cellular phone built-in a RFID reader chip or with a external RFID reader device, we can prevent other people from gathering the information related with objects querying information server (like an EPC IS) with a tag ID or deriving the information from tag ID’s code structure or tracking the location of the objects and the owner of the objects. In this paper, we use a cryptographic algorithm for modification and restoring of RFID tag ID, and for one original tag ID, there are several different temporary tag ID, periodically. Keywords—EPC, RFID, Mobile RFID.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network

Recently, mobile RFID (Radio Frequency Identification) services such as in smart poster or supply chain are rapidly growing up as a newly generating industry. Here, mobile RFID service is defined as a special type of mobile service using RFID tag packaging object and RFID reader attached mobile RFID terminal. This paper is to provide an approach for ensuring RFID net-work security based on secu...

متن کامل

Secure RFID Personal Data Management Using Privacy Reference Profile

We propose a secure framework for mobile-phone based RFID service using personal privacy policy based access control for personalized ultrahigh frequency (UHF) tags employing the Electronic Product Code (EPC). The framework, called mobile RPS, has dynamic capabilities that extend upon extent trust-building service mechanisms for RFID systems. This new technology aims to provide absolute confide...

متن کامل

A Secure Mobile RFID System Design

Mobile RFID is a new application that provides a valuable service to users with mobile communication. Current RFID authentication schemes are not viable to use in mobile RFID environment. Since unlike in regular RFID environments, whereas the communication channel between the server and the reader is assumed to be secure, the communication channel between the server and reader in the mobile RFI...

متن کامل

A Secure and Efficient Authentication Protocol for Mobile RFID Systems

AbstrAct: The design of a secure communication scheme for Radio Frequency Identification (RFID) systems has been extensively studied in recent years in view of the awareness of individual privacy and the requirement of robust system security. Most of previous works assume the communication channel between an RFID reader and its backend server is secure and concentrate on the security enhancemen...

متن کامل

Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID

The Internet has become the main transmission media in modern information systems due to the popularization of information technology and the rapid development of network technology. To use the Internet, we need complete security mechanisms which include requirements such as integrity, security and privacy to ensure the legal user can login to a remote server to get the service and resources th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005