Advertisement

Investigating Security in Multi-tree Based Technique in RFID Systems

  • Xu Huang
  • Dharmendra Sharma
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4253)

Abstract

Radio frequency identification (RFID) systems based on low-cost computing devices are small, inexpensive microchips capable of transmitting unique identifiers wirelessly, which make it dramatically increases the ability of the organization to acquire a vast array of data about the location and properties of any entity that can be physically tagged and wirelessly scanned within certain technical limitations. However, its security has been a major project to be focused on for RFID systems. In this paper the “tree-based” technique will be carefully investigated and a multi-tree group method is first discussed and the outcomes of investigations suggest that the overall probability that the whole attack succeeds is sharply dropped.

Keywords

Pervasive Computing Radio Frequency Identification Electronic Product Code Cryptographic Operation Hash Chain 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Huber, G.P.: Organizational Learning: Contributing Processes and the Literatures. Org. Sci. 2(1), 88–115 (1991)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Standford, V.: Pervasive Computing Goes the Last Hundred Feet with RFID Systems. IEEE Perv. Comp. (April–May 2003)Google Scholar
  3. 3.
    Angeles, R.: RFID Technologies: Supply-Chain Applications and Implementation Issues. Info. Sys. Mgmt., pp. 51–65 (Winter, 2005)Google Scholar
  4. 4.
    Thompson, C.A.: Radio Frequency Tags for Identifying Legitimate Drug Products Discussed by Tech Industry. Amer. J. Health-Sys. Pharm. 61(14), 1430–1431 (2004)Google Scholar
  5. 5.
    Yang, G., Jarvenpaa, S.I.: Trust and Radio Frequency Identification (RFID) Adoption within an Alliance. In: Sprague, R. (ed.) Proc. 38th Hawaii Intl. Conff. Sys. Sci., Big Island, HI, January, pp. 855–864. IEEE Comp. Soc. Press, Los. Alamitos (2005)Google Scholar
  6. 6.
    Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically-enable RFID device. In: 14th USENIX Security Symposium, Baltimore, Maryland, USA, July-August 2005, pp. 1–16. USENIX (2005)Google Scholar
  7. 7.
    Electronic Product Code Global Inc., http://www.epcglobalinc.org
  8. 8.
    Avoine, G.: Security and privacy in RFID systems. Online bibliography available at: http://lasecwww.epfl.ch/~gavoine/rfid/
  9. 9.
    Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Pfitzmann, B., Liu, P. (eds.) Conference on Computer and Communications Security-CCS 2004, Washington, DC, USA, October 2004, pp. 210–219. ACM Press, New York (2004)Google Scholar
  10. 10.
    Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal reencryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  11. 11.
    Henrico, D., Muller, P.: Tacking security and privacy issues in radio frequency identification devices. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001, pp. 219–224. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approch to “privacy-friendly” tags. In: RFID Privacy Workshop. MIT, Massachusetts (2003)Google Scholar
  13. 13.
    Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: International Workshop on Pervasive Computing and Communication Security, PerSec 2005, Kauai Island, Hawaii, USA, March 2005, pp. 110–114. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Xu Huang
    • 1
  • Dharmendra Sharma
    • 1
  1. 1.School of Information Sciences and EngineeringUniversity of CanberraAustralia

Personalised recommendations