Skip to main content

Investigating Security in Multi-tree Based Technique in RFID Systems

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4253))

Abstract

Radio frequency identification (RFID) systems based on low-cost computing devices are small, inexpensive microchips capable of transmitting unique identifiers wirelessly, which make it dramatically increases the ability of the organization to acquire a vast array of data about the location and properties of any entity that can be physically tagged and wirelessly scanned within certain technical limitations. However, its security has been a major project to be focused on for RFID systems. In this paper the “tree-based” technique will be carefully investigated and a multi-tree group method is first discussed and the outcomes of investigations suggest that the overall probability that the whole attack succeeds is sharply dropped.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huber, G.P.: Organizational Learning: Contributing Processes and the Literatures. Org. Sci. 2(1), 88–115 (1991)

    Article  MathSciNet  Google Scholar 

  2. Standford, V.: Pervasive Computing Goes the Last Hundred Feet with RFID Systems. IEEE Perv. Comp. (April–May 2003)

    Google Scholar 

  3. Angeles, R.: RFID Technologies: Supply-Chain Applications and Implementation Issues. Info. Sys. Mgmt., pp. 51–65 (Winter, 2005)

    Google Scholar 

  4. Thompson, C.A.: Radio Frequency Tags for Identifying Legitimate Drug Products Discussed by Tech Industry. Amer. J. Health-Sys. Pharm. 61(14), 1430–1431 (2004)

    Google Scholar 

  5. Yang, G., Jarvenpaa, S.I.: Trust and Radio Frequency Identification (RFID) Adoption within an Alliance. In: Sprague, R. (ed.) Proc. 38th Hawaii Intl. Conff. Sys. Sci., Big Island, HI, January, pp. 855–864. IEEE Comp. Soc. Press, Los. Alamitos (2005)

    Google Scholar 

  6. Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically-enable RFID device. In: 14th USENIX Security Symposium, Baltimore, Maryland, USA, July-August 2005, pp. 1–16. USENIX (2005)

    Google Scholar 

  7. Electronic Product Code Global Inc., http://www.epcglobalinc.org

  8. Avoine, G.: Security and privacy in RFID systems. Online bibliography available at: http://lasecwww.epfl.ch/~gavoine/rfid/

  9. Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Pfitzmann, B., Liu, P. (eds.) Conference on Computer and Communications Security-CCS 2004, Washington, DC, USA, October 2004, pp. 210–219. ACM Press, New York (2004)

    Google Scholar 

  10. Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal reencryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Henrico, D., Muller, P.: Tacking security and privacy issues in radio frequency identification devices. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001, pp. 219–224. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approch to “privacy-friendly” tags. In: RFID Privacy Workshop. MIT, Massachusetts (2003)

    Google Scholar 

  13. Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: International Workshop on Pervasive Computing and Communication Security, PerSec 2005, Kauai Island, Hawaii, USA, March 2005, pp. 110–114. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, X., Sharma, D. (2006). Investigating Security in Multi-tree Based Technique in RFID Systems. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4253. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893011_145

Download citation

  • DOI: https://doi.org/10.1007/11893011_145

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46542-3

  • Online ISBN: 978-3-540-46544-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics