RFID System with Fairness Within the Framework of Security and Privacy

  • Jin Kwak
  • Keunwoo Rhee
  • Soohyun oh
  • Seungjoo Kim
  • Dongho Won
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3813)

Abstract

Radio Frequency Identification (RFID) systems are expected to be widely deployed in automated identification and supply-chain applications. Although RFID systems have several advantages, the technology may also create new threats to user privacy. In this paper, we propose the Fair RFID system. This involves improving the security and privacy of existing RFID systems while keeping in line with procedures already accepted by the industrial world. The proposed system enables the protection of users’ privacy from unwanted scanning, and, when necessary, is conditionally traceable to the tag by authorized administrators.

Keywords

Fairness RFID security privacy uncheckable traceability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cachin, C.: On-Line Secret Sharing. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol. 1025, pp. 190–198. Springer, Heidelberg (1995)Google Scholar
  2. 2.
    Chen, L., Gollmann, D., Mitchell, C.J., Wild, P.: Secret sharing with Reusable Polynomial. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 183–193. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  3. 3.
    Engels, D.: The Reader Collision Problem. Technical Report. MIT-AUTOID-WH-007, MIT Auto ID Center (2001), Available from http://www.autoidcenter.org
  4. 4.
    Ewatt, D.M., Hayes, M.: Gillette razors get new edge: RFID tags. Information Week, (January 13, 2003), Available from http://www.informationweek.com
  5. 5.
    Fedlman, P.: A Practical scheme for Non-interactive Verifiable secret sharing. In: 28th Annual Symposium on the Foundation of Computer Science, pp. 427–437 (1987)Google Scholar
  6. 6.
    Finkenzeller, K.: RFID Handbook. John Wiley and Sons, Chichester (1999)Google Scholar
  7. 7.
    Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: 2nd IEEE International Workshop on Pervqsive Computing and Communications Security, PerSec 2005, pp. 110–114. IEEE, Los Alamitos (2005)Google Scholar
  8. 8.
    Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103–111 (2003)Google Scholar
  11. 11.
    Kim, S.J., Park, S.J., Won, D.H.: Proxy Signatures, Revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  12. 12.
    Knospe, H., Pobl, H.: RFID Security. Information Security Technical Report, vol. 9(4), pp. 39-50, Elsevier (2004)Google Scholar
  13. 13.
    Auto-ID Center, M.I.T. (EPCglobal), http://www.epcglobalinc.org
  14. 14.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: A Cryptographic Approach to “Privacy-Friendly” tag. In: RFID Privacy Workshop (November 2003), http://www.rfidprivacy.org/
  15. 15.
    Pedersen, T.P.: A Threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)Google Scholar
  16. 16.
    Rhee, K.W., Kwak, J., Kim, S.J., Won, D.H.: Challenge-Response Based RFID Authentication Protocols for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  17. 17.
    Sarma, S.E.: Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center (2001), Available from http://www.autoidcenter.org
  18. 18.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT (2002)Google Scholar
  19. 19.
    Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency identification systems. In: Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  20. 20.
    Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency-identification security risks and challenges. CryptoBytes 6(1) (2003)Google Scholar
  21. 21.
    Scharfeld, T.: An Analysis of the Fundamental Constraints on Low Cost Passive Radio-Frequency Identification System Design. MS Thesis, Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge, MA 02139 (2001)Google Scholar
  22. 22.
    Security technology: Where’s the smart money? The Economist, 69–70 (February 9, 2002)Google Scholar
  23. 23.
    Shamir, A.: How to share a secret. Communication of the ACM 21, 120–126 (1979)MathSciNetGoogle Scholar
  24. 24.
    Tompa, M., Woll, H.: How to share a secret with cheater. Journal of Cryptology 1, 133–138 (1988)MATHCrossRefMathSciNetGoogle Scholar
  25. 25.
    Vajda, I., Buttyan, L.: Lightweight Authentication Protocols for Low-Cost RFID Tags. In: 2nd Workshop on Security in Ubiquitous Computing, Ubicomp 2003 (2003)Google Scholar
  26. 26.
    Weis, S.A.: Radio-frequency identification security and privacy. Master’s thesis, M.I.T (May 2003)Google Scholar
  27. 27.
    Weis, A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Jin Kwak
    • 1
  • Keunwoo Rhee
    • 1
  • Soohyun oh
    • 2
  • Seungjoo Kim
    • 1
  • Dongho Won
    • 1
  1. 1.Information Security GroupSunkyunkwan UniversitySuwon, Gyeonggi-doKorea
  2. 2.Division of Computer ScienceHoseo UniversityChuncheongnam-doKorea

Personalised recommendations