Considerations on the Security and Efficiency of RFID Systems

  • Jung-Sik Cho
  • Soo-Cheol Kim
  • Sang-Soo Yeo
  • SungKwon Kim
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 107)

Abstract

The RFID system is a contactless automatic identification system using small, low-cost RFID tag. The RFID system can be applied in various fields. For the widespread use of RFID systems, security threats such as user privacy violation and location privacy violation must be addressed. As the major advantage of RFID systems is increased efficiency, RFID security schemes should be designed to prevent security threats while maintaining the efficiency of the RFID systems. This paper identifies concerns regarding RFID security and efficiency that must be considered in building an RFID security scheme.

Keywords

RFID system Privacy Forgery Hash Authentication 

References

  1. 1.
    Finkenzeller K (2002) RFID Handbook 2nd edn. WileyGoogle Scholar
  2. 2.
    EPC Radio-Frequency identity protocols class-1 generation-2 (2008) UHF RFID protocol for communications at 860 MHz–960 MHz Version 1.2.0. EPCglobal IncGoogle Scholar
  3. 3.
    Juels A (2006) RFID security and privacy a research survey. Sel Areas Commun 24(2):381–394MathSciNetCrossRefGoogle Scholar
  4. 4.
    Cho J, Kim S, Yeo S (2011) RFID System security analysis, response strategies and research directions.In:Ninth IEEE international symposium on parallel and distributed processing with applications workshops, IEEE Comput Soc, pp 371–376Google Scholar
  5. 5.
    Syamsuddin I, Dillon, T, Chang, E, Han S (2008) A survey of RFID authentication protocols based on hash-chain method. In: Third international conference on convergence and hybrid information technology–ICCIT 2008, vol.2, pp 559—564Google Scholar
  6. 6.
    Yeo S, Kim S (2005) Scalable and flexible privacy protection scheme for RFID systems. European workshop on security and privacy in Ad hoc and sensor networks—ESAS’05, LNCS, vol. 3813, Springer, Heidelberg, pp 153–163 Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2011

Authors and Affiliations

  • Jung-Sik Cho
    • 1
  • Soo-Cheol Kim
    • 1
  • Sang-Soo Yeo
    • 2
  • SungKwon Kim
    • 1
  1. 1.Division of Computer Science and EngineeringChung-Ang UniversitySeoulRepublic of Korea
  2. 2.Division of Computer EngineeringMokwon UniversityDeajeonRepublic of Korea

Personalised recommendations