Authorized Tracking and Tracing for RFID Tags

  • Ming-Yang Chen
  • Ching-Nung Yang
  • Chi-Sung Laih
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4097)


Radio Frequency Identification (RFID) systems have become popular for identifying not only objects but also persons. For example, in supply chain applications, the company can constantly track the movements of goods. Also, for Body Area Network or Personal Area Work, the tag is used for identifying a person. However, the movements and current locations of goods and a person’s activity profiles are the sensitive information and should be kept secret. This paper develops the interaction protocols between readers and tags to address this privacy issue of protecting tagged objects from tracking and tracing by non-authorized readers.


Hash Function Radio Frequency Identification Body Area Network Resistance Ability Authorized Request 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. Master’s thesis, Massachusetts Institute of Technology, Cambridge, MA 02139 (May 2003)Google Scholar
  2. 2.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–470. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Sarma, S.E., Weis, S.A., Engels, D.W.: Radio Frequency Identification: Risks and Challenges. CryptoBytes (RSA Laboratories 6(1) (Winter/Spring 2003)Google Scholar
  4. 4.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to a privacy friendly tag. In: RFID Privacy Workshop, MIT, Cambridge (2003)Google Scholar
  6. 6.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain Based RFID Privacy Protection Scheme. In: Ubiquitous Computing (UBICOMP) (September 2004)Google Scholar
  7. 7.
    Kinoshita, S., Ohkubo, M., Hoshino, F., Morohashi, G., Shionoiri, O., Kanai, A.: Privacy Enhanced Active RFID Tag. In: 1st International Workshop on exploiting context histories in smart environments (2005)Google Scholar
  8. 8.
    Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: Pervasive Computing and Communications (PerCom), pp. 149–153. IEEE Computer Society, Los Alamitos (2004)Google Scholar
  9. 9.
    Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Computer and Communications Security, pp. 103–111. ACM Press, New York (2003)Google Scholar
  10. 10.
    Juels, A., Brainard, J.: Soft Blocking; Flexible Blocker Tags on the Cheap. In: Workshop on Privacy in the Electronic Society (WPES) (2004)Google Scholar
  11. 11.
    AWID, available at,
  12. 12.
    STMicroelectonics, available at,

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ming-Yang Chen
    • 1
  • Ching-Nung Yang
    • 2
  • Chi-Sung Laih
    • 1
  1. 1.Department of Electrical EngineeringNational Cheng-Kung UniversityTaiwan
  2. 2.Department of Computer Science and Information EngineeringNational Dong Hwa University 

Personalised recommendations