An RFID System Based MCLT System with Improved Privacy

  • Jin Kwak
  • Keunwoo Rhee
  • Namje Park
  • Howon Kim
  • Seungjoo Kim
  • Kouichi Sakurai
  • Dongho Won
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4097)

Abstract

Radio Frequency Identification (RFID) systems are increasingly becoming accepted for many EPC Network applications. However, RFID systems have some privacy problems. In this paper, a system for missing child location tracking in the EPC Network applications, is proposed. The proposed system improves security and privacy compared to existing applications, while also keeping in line with traditional procedures, commonly accepted by most industrial applications. The proposed MCLT (Missing Child Location Tracking) system can protect users’ privacy while providing location tracking of the RFID tag.

Keywords

EPC Network RFID system application service privacy security location tracking 

References

  1. 1.
    Brock, D.L.: The electronic product code (EPC): A naming scheme for objects. Technical Report MIT-AUTOID-WH-002, MIT Auto ID Center (2001), Available from, http://www.autoidcenter.org
  2. 2.
    Brock, D.L.: EPC Tag Data Specification. Technical Report MIT-AUTOID-WH-025, MIT Auto ID Center (2003), Available from, http://www.autoidcenter.org
  3. 3.
    Cachin, C.: On-Line Secret Sharing. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol. 1025, pp. 190–198. Springer, Heidelberg (1995)Google Scholar
  4. 4.
    Chen, L., Gollmann, D., Mitchell, C.J., Wild, P.: Secret sharing with Reusable Polynomial. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 183–193. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  5. 5.
    Engels, D.: The Reader Collision Problem. Technical Report. MIT-AUTOID-WH-007, MIT Auto ID Center (2001), Available from, http://www.autoidcenter.org
  6. 6.
    Engels, D.: EPC-256 : The 256-bit Electronic Product Code Representation. Technical Report MIT-AUTOID-WH-010, MIT Auto ID Center (2003), Available from, http://www.autoidcenter.org
  7. 7.
    EPCglobal. The EPCglobal Network: Overview of Design, Benefits, and Security (September 24, 2004), Available from, http://www.epcglobalinc.org
  8. 8.
    Ewatt, D.M., Hayes, M.: Gillette razors get new edge: RFID tags. Information Week (January 13, 2003), Available from, http://www.informationweek.com
  9. 9.
    Fedlman, P.: A Practical scheme for Non-interactive Verifiable secret sharing. In: The 28th Annual Symposium on the Foundation of Computer Science, pp. 427–437 (1987)Google Scholar
  10. 10.
    Finkenzeller, K.: RFID Handbook. John Wiley and Sons, Chichester (1999)Google Scholar
  11. 11.
    Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2005. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)Google Scholar
  12. 12.
    Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103–111 (2003)Google Scholar
  13. 13.
    Kim, S., Park, S., Won, D.: Proxy Signatures, Revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  14. 14.
    Knospe, H., Pobl, H.: RFID Security. Information Security Technical Report 9(4), 39–50 (2004)CrossRefGoogle Scholar
  15. 15.
    Kwak, J., Rhee, K., Oh, S., Kim, S., Won, D.: RFID System wuth Fairness within the frmaework of Security and Privacy. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, Springer, Heidelberg (2005)CrossRefGoogle Scholar
  16. 16.
    Leong, K.S., Ng, M.L.: A Simple EPC Enterprise Model. Auto-ID Labs Workshop Zurich (2004), Available from, http://www.m-lab.ch
  17. 17.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: A Cryptographic Approach to ”Privacy-Friendly” tag. In: RFID Privacy Workshop (November 2003), http://www.rfidprivacy.org/
  18. 18.
    Pedersen, T.P.: A Threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)Google Scholar
  19. 19.
    Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  20. 20.
    Sarma, S.E.: Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center (2001), Available from, http://www.autoidcenter.org
  21. 21.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT (2002)Google Scholar
  22. 22.
    Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency identification systems. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  23. 23.
    Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency-identification security risks and challenges. CryptoBytes 6(1) (2003)Google Scholar
  24. 24.
    Scharfeld, T.: An Analysis of the Fundamental Constraints on Low Cost Passive Radio-Frequency Identification System Design. MS Thesis, Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge, MA 02139 (2001)Google Scholar
  25. 25.
    Security technology: Where’s the smart money? The Economist, pp. 69–70 (February 9, 2002)Google Scholar
  26. 26.
    Shamir, A.: How to share a secret. Communication of the ACM 21, 120–126 (1979)MathSciNetGoogle Scholar
  27. 27.
    Tompa, M., Woll, H.: How to share a secret with cheater. Journal of Cryptology 1, 133–138 (1988)MATHCrossRefMathSciNetGoogle Scholar
  28. 28.
    Weis, S.A.: Radio-frequency identification security and privacy. Master’s thesis, M.I.T. (May 2003)Google Scholar
  29. 29.
    Weis, S.A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) SPC 2004. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jin Kwak
    • 1
  • Keunwoo Rhee
    • 2
  • Namje Park
    • 2
    • 3
  • Howon Kim
    • 3
  • Seungjoo Kim
    • 2
  • Kouichi Sakurai
    • 1
  • Dongho Won
    • 2
  1. 1.Faculty of Information Science and Electrical EngineeringKyushu UniversityJapan
  2. 2.Information Security GroupSunkyunkwan UniversityKorea
  3. 3.Information Security Research DivisionETRIKorea

Personalised recommendations