Secure UHF/HF Dual-Band RFID : Strategic Framework Approaches and Application Solutions
Abstract
In the mobile RFID (Radio-Frequency Identification) environment, scanning RFID tags which are personalized can bring some privacy infringement issues. In spite of the case that private information is not stored in those tags, one can identify entities, analyze their preferences, and track them by collecting data related with the tags and aggregating it. Especially, it might be more serious at the point of that data collection may be done not only by enterprises and government, but also by individuals. In this paper, we describe privacy infringements for the mobile RFID service environment. The proposed framework provides a means for securing the stability of mobile RFID services by suggesting personal policy based access control for personalized tags.
Keywords
RFID Security Mobile RFID Privacy hospital HealthcarePreview
Unable to display preview. Download preview PDF.
References
- 1.Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing (2011)Google Scholar
- 2.Kim, Y., Lee, J., Yoo, S., Kim, H.: A Network Reference Model for B2C RFID Applications. In: Proceedings of ICACT (2006)Google Scholar
- 3.Chae, J., Oh, S.: Information Report on Mobile RFID in Korea. ISO/IEC JTC 1/SC 31/WG 4 N 0922, Information paper, ISO/IEC JTC 1 SC 31 WG4 SG 5 (2005)Google Scholar
- 4.Park, N., Song, Y., Won, D., Kim, H.: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. In: Zhang, Y., Yu, G., Hwang, J., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008)CrossRefGoogle Scholar
- 5.Park, W., Lee, B.: Proposal for participating in the Correspondence Group on RFID in ITU-T. Information Paper. ASTAP Forum (2004)Google Scholar
- 6.Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 7.Park, N., Kim, H., Kim, S., Won, D.: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 8.Chug, B., et al.: Proposal for the study on a security framework for mobile RFID applications as a new work item on mobile security. ITU-T, COM17D116E, Q9/17, Contribution 116, Geneva (2005)Google Scholar
- 9.Park, N., Kim, H.W., Kim, S., Won, D.H.: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 10.Lee, J., Kim, H.: RFID Code Structure and Tag Data Structure for Mobile RFID Services in Korea. In: Proceedings of ICACT (2006)Google Scholar
- 11.Park, N., Kim, S., Won, D.: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. In: ASC. Advances in Soft Computing, vol. 43, pp. 151–156. Springer, Heidelberg (2007)Google Scholar
- 12.Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 13.Park, N., Kim, S., Won, D., Kim, H.: Security Analysis and Implementation Leveraging Globally Networked RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 14.Park, N., Lee, H., Kim, H., Won, D.: A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone. In: IEEE Tenth International Symposium on Consumer Electronics, ISCE 2006, pp. 1–5. IEEE, Los Alamitos (2006)Google Scholar
- 15.Park, N., Kim, H., Chung, K., Sohn, S.: Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems. In: IEEE Tenth International Symposium on Consumer Electronics, ISCE 2006, pp. 1–6. IEEE, Los Alamitos (2006)Google Scholar
- 16.Park, N., Gadh, R.: Implementation of Cellular Phone-based Secure Light-Weight Middleware Platform for Networked RFID. In: 28th International Conference on Consumer Electronics, ICCE 2010, pp. 495–496. IEEE, Los Alamitos (2010)Google Scholar
- 17.Park, N.: Reliable System Framework leveraging Globally Mobile RFID in Ubiquitous Era. In: Ph.D. Thesis. Sungkyunkwan University, South Korea (2008)Google Scholar
- 18.Lee, H., Kim, J.: Privacy Threats and Issues in Mobile RFID. In: Proceedings of the First International Conference on Availability, Reliability and Security, vol. 1 (2006)Google Scholar
- 19.MIC (Ministry of Information and Communication) of Korea (2005) RFID Privacy Protection Guideline. MIC Report Paper (2005)Google Scholar
- 20.Mobile RFID Forum of Korea: WIPI C API Standard for Mobile RFID Reader. Standard Paper (2005)Google Scholar
- 21.Mobile RFID Forum of Korea: WIPI Network APIs for Mobile RFID Services. Standard Paper (2005)Google Scholar
- 22.Mobile RFID Forum of Korea: Mobile RFID Code Structure and Tag Data Structurefor Mobile RFID Services. Standard Paper (2005)Google Scholar
- 23.Mobile RFID Forum of Korea: Access Right Management API Standard for SecureMobile RFID Reader, MRFS-4-03. Standard Paper (2005)Google Scholar
- 24.Mobile RFID Forum of Korea: HAL API Standard for RFID Reader of Mobile Phone, Standard Paper (2005)Google Scholar
- 25.Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 26.Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010. LNCS(LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 27.Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)CrossRefGoogle Scholar