Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services

  • Namje Park
  • Jin Kwak
  • Seungjoo Kim
  • Dongho Won
  • Howon Kim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4251)


RFID (Radio Frequency Identification) technology will be a ubiquitous reality in daily life in the near future. The R&D groups in global now have paid attention to integrate RFID with mobile phone devices as well as to associate with the existing mobile telecommunication network. Such a converged technology and services would lead to make new markets and research challenges. However, privacy threats on RFID tags embedded into products has become stumbling block. Therefore, this paper propose a new security technique for mobile RFID service, which can be support to secure RFID service and uses the privacy protection in mobile RFID network services.


Privacy Protection Application Service Provider Security Technique Service Mechanism Mobile Telecommunication Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Tsuji, T., Kouno, S., Noguchi, J., Iguchi, M., Misu, N., Kawamura, M.: Asset management solution based on RFID. NEC Journal of Advanced Technology 1(3), 188–193 (Summer 2004)Google Scholar
  2. 2.
    Sullivan L.: Middleware enables RFID tests. Information Week, No.991 (2004) Google Scholar
  3. 3.
    Chae, J., Oh, S.: Information Report on Mobile RFID in Korea. ISO/IEC JTC 1/SC 31/WG 4 N 0922, Information paper, ISO/IEC JTC 1 SC 31 WG4 SG 5 (2005)Google Scholar
  4. 4.
    Jin, S., et al.: Cluster-based Trust Evaluation Scheme in Ad Hoc Network. ETRI Journal 27(4), 465–468 (2005)zbMATHCrossRefGoogle Scholar
  5. 5.
    Choi, W., et al.: An RFID Tag Using a Planar Inverted-F Antenna Capable of Being Stuck to Metallic Objects. ETRI Journal 28(2), 216–218 (2006)CrossRefGoogle Scholar
  6. 6.
    Bae, B.S., et al.: Stability of an Amorphous Silicon Oscillator. ETRI Journal 28(1), 45–50 (2006)CrossRefMathSciNetGoogle Scholar
  7. 7.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT (2002)Google Scholar
  8. 8.
    Weis, S., et al.: Security and Privacy Aspects of Low-Cost Radio Frequency identification Systems. In: First International Conference on Security in Pervasive Computing (SPC) (2003)Google Scholar
  9. 9.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-Friendly Tags. RFID Privacy Workshop (2003)Google Scholar
  10. 10.
    Park, N., Kim, H., Kim, S., Won, D.: Open Location-based Service using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Yutaka, Y., Nakao, K.: A Study of Privacy information Handling on Sensor Information etwork. Technical report of IEICE (2002)Google Scholar
  12. 12.
    Nokia.: RFID Phones – Nokia Mobile RFID Kit,
  13. 13.
    Yoo, S.: Mobile RFID Activities in Korea. The APT Standardization Program (2006)Google Scholar
  14. 14.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  15. 15.
    Chug, B., et al.: Proposal for the study on a security framework for mobile RFID applications as a new work item on mobile security. ITU-T, COM 17 – D 116 – E, Geneva (2005)Google Scholar
  16. 16.
    Kwak, J., Rhee, K., Oh, S., Kim, S., Won, D.: RFID System with Fairness within the Framework of Security and Privacy. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 142–152. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Namje Park
    • 1
    • 3
  • Jin Kwak
    • 2
  • Seungjoo Kim
    • 3
  • Dongho Won
    • 3
  • Howon Kim
    • 1
  1. 1.Information Security Research DivisionETRIDaejeonKorea
  2. 2.Faculty of Information Science and Electrical EngineeringKyushu UniversityFukuokaJapan
  3. 3.Information Security GroupSungkyunkwan UniversitySuwon, Gyeonggi-doKorea

Personalised recommendations