Security Analysis and Implementation Leveraging Globally Networked RFIDs

  • Namje Park
  • Seungjoo Kim
  • Dongho Won
  • Howon Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4217)

Abstract

Mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and profiling using RFID technology. Therefore, in this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID service which complies with the Korea’s mobile RFID forum standard.

References

  1. 1.
    Tsuji, T., Kouno, S., Noguchi, J., Iguchi, M., Misu, N., Kawamura, M.: Asset management solution based on RFID. NEC Journal of Advanced Technology 1(3), 188–193 (summer, 2004)Google Scholar
  2. 2.
    Chae, J., Oh, S.: Information Report on Mobile RFID in Korea. ISO/IEC JTC 1/SC 31/WG 4 N 0922, Information paper, ISO/IEC JTC 1 SC 31 WG4 SG 5 (2005)Google Scholar
  3. 3.
    Jin, S., et al.: Cluster-based Trust Evaluation Scheme in Ad Hoc Network. ETRI Journal 27(4), 465–468 (2005)MATHCrossRefGoogle Scholar
  4. 4.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT (2002)Google Scholar
  5. 5.
    Choi, W., et al.: An RFID Tag Using a Planar Inverted-F Antenna Capable of Being Stuck to Metallic Objects. ETRI Journal 28(2), 216–218 (2006)CrossRefGoogle Scholar
  6. 6.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-Friendly Tags. In: RFID Privacy Workshop (2003)Google Scholar
  8. 8.
    Ahn, J., et al.: An Analysis of Consumer Preferences among Wireless LAN and Mobile Internet Services. ETRI Journal 28(2), 205–215 (2006)CrossRefGoogle Scholar
  9. 9.
    Park, W., Lee, B.: Proposal for participating in the Correspondence Group on RFID in ITU-T. Information Paper. ASTAP Forum (2004)Google Scholar
  10. 10.
    Yoo, S.: Mobile RFID Activities in Korea. The APT Standardization Program (2006)Google Scholar
  11. 11.
    Park, N., Kwak, J., Kim, S., Won, D.H., Kim, H.W.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  12. 12.
    Chug, B., et al.: Proposal for the study on a security framework for mobile RFID applications as a new work item on mobile security. ITU-T, COM17D116E, Geneva (2005)Google Scholar
  13. 13.
    MRF Forum: WIPI C API Standard for Mobile RFID Reader (2005) Google Scholar
  14. 14.
    MRF Forum: WIPI Network APIs for Mobile RFID Services (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Namje Park
    • 1
    • 2
  • Seungjoo Kim
    • 2
  • Dongho Won
    • 2
  • Howon Kim
    • 1
  1. 1.Information Security Research DivisionETRIDaejeonKorea
  2. 2.Information Security GroupSungkyunkwan UniversitySuwonKorea

Personalised recommendations