Investigating Security in Multi-tree Based Technique in RFID Systems
Radio frequency identification (RFID) systems based on low-cost computing devices are small, inexpensive microchips capable of transmitting unique identifiers wirelessly, which make it dramatically increases the ability of the organization to acquire a vast array of data about the location and properties of any entity that can be physically tagged and wirelessly scanned within certain technical limitations. However, its security has been a major project to be focused on for RFID systems. In this paper the “tree-based” technique will be carefully investigated and a multi-tree group method is first discussed and the outcomes of investigations suggest that the overall probability that the whole attack succeeds is sharply dropped.
KeywordsPervasive Computing Radio Frequency Identification Electronic Product Code Cryptographic Operation Hash Chain
Unable to display preview. Download preview PDF.
- 2.Standford, V.: Pervasive Computing Goes the Last Hundred Feet with RFID Systems. IEEE Perv. Comp. (April–May 2003)Google Scholar
- 3.Angeles, R.: RFID Technologies: Supply-Chain Applications and Implementation Issues. Info. Sys. Mgmt., pp. 51–65 (Winter, 2005)Google Scholar
- 4.Thompson, C.A.: Radio Frequency Tags for Identifying Legitimate Drug Products Discussed by Tech Industry. Amer. J. Health-Sys. Pharm. 61(14), 1430–1431 (2004)Google Scholar
- 5.Yang, G., Jarvenpaa, S.I.: Trust and Radio Frequency Identification (RFID) Adoption within an Alliance. In: Sprague, R. (ed.) Proc. 38th Hawaii Intl. Conff. Sys. Sci., Big Island, HI, January, pp. 855–864. IEEE Comp. Soc. Press, Los. Alamitos (2005)Google Scholar
- 6.Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically-enable RFID device. In: 14th USENIX Security Symposium, Baltimore, Maryland, USA, July-August 2005, pp. 1–16. USENIX (2005)Google Scholar
- 7.Electronic Product Code Global Inc., http://www.epcglobalinc.org
- 8.Avoine, G.: Security and privacy in RFID systems. Online bibliography available at: http://lasecwww.epfl.ch/~gavoine/rfid/
- 9.Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Pfitzmann, B., Liu, P. (eds.) Conference on Computer and Communications Security-CCS 2004, Washington, DC, USA, October 2004, pp. 210–219. ACM Press, New York (2004)Google Scholar
- 12.Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approch to “privacy-friendly” tags. In: RFID Privacy Workshop. MIT, Massachusetts (2003)Google Scholar
- 13.Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: International Workshop on Pervasive Computing and Communication Security, PerSec 2005, Kauai Island, Hawaii, USA, March 2005, pp. 110–114. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar