Skip to main content
Log in

Single tag sharing scheme for multiple-object RFID applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

RFID systems have been widely adopted in various industrial as well as personal applications. However, traditional RFID systems are limited to address only one tag for each application object. This limitation hinders the usability of RFID applications because it is difficult, if not impossible, to distinguish many tags simultaneously with existing RFID systems. In this paper, we propose a new RFID tag structure to support multiple-objects that can be easily shared by many different RFID applications. That is, the proposed RFID tag structure supports that a tag maintains several different objects and allows those applications to access them simultaneously. We also propose an authentication protocol to support multiple-object RFID applications. Especially, we focus on the efficiency of the authentication protocol by considering different security levels in RFID applications. The proposed protocol includes two types of authentication procedures. In the proposed protocol, an object has its security level and goes through one of different authentication procedures suitable for its security level. We report the results of a simulation to test the performance of the proposed scheme. In our simulation, we considered the safety of our scheme against potential attacks and evaluated the efficiency of the proposed protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Garfinkel, S. and Rosenberg, B, “RFID: Applications, Security and Privacy”, Addison Wesley, ISBN 0-321-29096-8, 2005.

  2. IETF RFC 4269, “The SEED encryption algorithm”, IETF(The Internet Engineering Task Force), 2005.

  3. Juels, A.; Rivest, R. L. & Szydlo, M., “The blocker tag: selective blocking of RFID tags for consumer privacy”, Proceedings of 10th ACM Conference on Computer and Communications Security(CCS 2003), pp. 103–111, Washington DC., USA, October, 2003.

  4. Jung YG, Han MS, Chung KY, Lee SJ (2011) A Study of a Valid Frequency Range using Correlation Analysis of Throat Signal. Information-An International Interdisciplinary Journal 14(11):3791–3799

    Google Scholar 

  5. Ko H, Kim J, Jung J, Joe S, Lee Y, Chang Y, Lee K (2007) A Study on the RFID Tag Encryption using Fast SEED, ICCMSE2007 Corfu, Greece, 571–574

  6. mCloak, http://www.mobilecloak.com, 2003.

  7. Ohkubo M, Suzuki K, Kinoshita S (2003) Cryptographic approach to “Privacy-friendly” tags, RFID Privacy Workshop @MIT.

  8. Saito J, Sakurai K (2004) Variable ID scheme of anonymity in RFID tags, Proceedings of the 2004 Symposium on Cryptography and Information Security, Vol. 1, pp. 713–718, Sendai, Japan

  9. Song CW, Chung KY, Jung JJ, Rim KW, Lee JH (2011) Localized Approximation Method Using Inertial Compensation in WSNs. Information - An International Interdisciplinary Journal 14(11):3591–3600

    Google Scholar 

  10. TTAR-06.0013, “Technical report on numbering an RFID tag, TTA Technical Report”, TTA(Telecommunication Technology Association), 2006.

  11. Weis SA, Sarma SE, Rivest RL, Engels DW (2003) Security and privacy aspects of low-cost radio frequency identification systems, First International Conference on Security in Pervasive Computing, pp.201–202, Lecture Notes in Computer Science 2802, Springer-Verlag

Download references

Acknowledgments

This work was supported by the Daejin University Research Grants in 2013.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong-Jin Jung.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kim, JY., Chung, KY. & Jung, JJ. Single tag sharing scheme for multiple-object RFID applications. Multimed Tools Appl 68, 465–477 (2014). https://doi.org/10.1007/s11042-013-1357-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1357-4

Keywords

Navigation