Skip to main content

An Agent Based Back-End RFID Tag Management System

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6264))

  • 1340 Accesses

Abstract

Motivated by the plethora of RFID security protocols and the interoperability problems that this diversity causes, we propose a software agent-based platform that allows an RFID back-end subsystem to integrate and manage heterogeneous tags that are based on non-standardized implementations. In addition, we introduce a new suite of lightweight tag management protocols that support tag authentication, time-based tag delegation and ownership transfer. The protocols can take advantage of the proposed agent-based platform and do satisfy all the standard security and privacy requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, R.S., Tu, M.A.: Development of an agent-based system for manufacturing control and coordination with ontology and rfid technology. Expert Syst. Appl. 36, 7581–7593 (2009), http://portal.acm.org/citation.cfm?id=1508324.1508647

    Article  Google Scholar 

  2. Chow, H.K.H., Choy, K.L., Lee, W.B.: A dynamic logistics process knowledgebased system - an rfid multi-agent approach. Know.-Based Syst. 20(4), 357–372 (2007)

    Article  Google Scholar 

  3. Dimitriou, T.: rfiddot: Rfid delegation and ownership transfer made simple. In: Proceedings of the 4th international conference on Security and privacy in communication networks, SecureComm ’08, pp. 34:1–34:8. ACM, New York (2008) http://doi.acm.org/10.1145/1460877.1460921

  4. Fischer-Hbner, S., Hedbom, H.: WP12: A holistic privacy framework for RFID applications: Future of IDentity in the information society. Deliverable D12.3, FIDIS consortium: Future of Identity in the Information Society (April 2008), http://www.fidis.net/resources/deliverables/hightechid/d123-a-holistic-privacy-framework-for-rfid-applications/doc/13/

  5. Fouladgar, S., Afifi, H.: An efficient delegation and transfer of ownership protocol for RFID tags. In: First International EURASIP Workshop on RFID Technology, Vienna, Austria (September 2007)

    Google Scholar 

  6. ISO 8601:2004: Data elements and interchange formats – Information interchange – Representation of dates and times. ISO, Geneva, Switzerland (2004)

    Google Scholar 

  7. Jedermann, R., Behrens, C., Westphal, D., Lang, W.: Applying autonomous sensor systems in logistics–Combining sensor networks, RFIDs and software agents. Sensors and Actuators A: Physical 132(1), 370–375 (2006), http://www.sciencedirect.com/science/article/B6THG-4JG5FBT-4/2/2dd9c816f409137409e604c48b68db05

    Article  Google Scholar 

  8. Koralalage, K.H., Reza, S.M., Miura, J., Goto, Y., Cheng, J.: POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism. In: Proceedings of the 2007 ACM symposium on Applied computing SAC’07, pp. 270–275. ACM, Seoul (2007), http://doi.acm.org/10.1145/1244002.1244069

    Chapter  Google Scholar 

  9. Lim, C.H., Kwon, T.: Strong and robust RFID authentication enabling perfect ownership transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 1–20. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Molnar, D., Soppera, A., Wagner, D.: Privacy for rfid through trusted computing. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, WPES ’05, pp. 31–34. ACM, New York (2005), http://doi.acm.org/10.1145/1102199.1102206

    Chapter  Google Scholar 

  11. Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 276–290. Springer, Heidelberg (2006), http://www.springerlink.com/content/27344v3647u75803

    Chapter  Google Scholar 

  12. OECD: Radio-Frequency identification (RFID): drivers, challenges and public policy considerations. Tech. Rep. DSTI/ICCP(2005)19/FINAL, Organisation for EconomicCo-operation and Development (OECD), Paris (March 2006), http://www.oecd.org/dataoecd/57/43/36323191.pdf

  13. Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 778–787. Springer, Heidelberg (2007), http://portal.acm.org/citation.cfm?id=1417774&coll=&dl=

    Chapter  Google Scholar 

  14. Rieback, M.R., Crispo, B., Tanenbaum, A.S.: Is your cat infected with a computer virus? In: PERCOM ’06: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications, March 2006, pp. 169–179. IEEE Computer Society Press, Pisa (2006)

    Google Scholar 

  15. Saito, J., Imamoto, K., Sakurai, K.: Reassignment scheme of an RFID tags key for owner transfer. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 1303–1312. Springer, Heidelberg (2005), http://dx.doi.org/10.1007/11596042_132

    Chapter  Google Scholar 

  16. Song, B.: RFID tag ownership transfer. In: Conference on RFID Security. Budaperst, Hungary (July 2008)

    Google Scholar 

  17. Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of Low-Cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 454–469. Springer, Heidelberg (2004), http://www.springerlink.com/content/yvmfpkwc9nq6hqdw

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rekleitis, E., Rizomiliotis, P., Gritzalis, S. (2010). An Agent Based Back-End RFID Tag Management System. In: Katsikas, S., Lopez, J., Soriano, M. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2010. Lecture Notes in Computer Science, vol 6264. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15152-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15152-1_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15151-4

  • Online ISBN: 978-3-642-15152-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics