Skip to main content

RFID System Security Using Identity-Based Cryptography

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5061))

Included in the following conference series:

  • 1224 Accesses

Abstract

RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional information and can be used in other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems. Identity-based cryptography can provide encryption and digital signature and convenience in key management compared with traditional certificate-based PKI solution. In this paper, a security management solution for the RFID system is proposed by using identity-based cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-Key Cryptography for RFID-Tags. In: Proceeding of the 5th International conference on Pervasive Computing and Communications Workshops (2007)

    Google Scholar 

  2. Beak, J., Newmarch, J., Safavi-Naini, R., Susilo, W.: A Survey of Identity-Based Cryptography. In: Proceeding of the 10th Annual Conference for Australian Unix and Open System User Group (AUUG 2004), pp. 95–102 (2004)

    Google Scholar 

  3. Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing Advances in Cryptology. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139. Springer, Heidelberg (2001)

    Google Scholar 

  4. Bono, S., Green, M.,, A.: Security Analysis of a Cryptographically Enabled RFID Device. In: USENIX Security Symposium – Security 2005, pp. 1–16 (2005)

    Google Scholar 

  5. Cocks, C.: An Identity-based Encryptoin Scheme Based on Quadratic Residues. In: Proceeding of 8th IMA International Conference on Cryptography and Coding (2001)

    Google Scholar 

  6. Diffie, W., Hellman, M.: New Direction in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  7. Inoue, S., Yasuura, H.: RFID privacy using user-controllable uniqueness. In: Proceeding RFID Privacy Workshop (November 2003)

    Google Scholar 

  8. Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Proceeding in the 4th Conference on Security in Communication Networks (2004)

    Google Scholar 

  9. Juels, A.: RFID Security and Privacy: A Research Survey. Selected Areas in Communications, IEEE Journal (2006)

    Google Scholar 

  10. Juels, A.: Strengthening EPC tags against cloning. In: Proceeding in the 6th International Conference on Web Information Systems Engineering (2005)

    Google Scholar 

  11. Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Proc. ACM Conf. Ubiquitous compute Security, pp. 210–219 (2004)

    Google Scholar 

  12. Molnar, D., Soppera, A., Wagner, D.: A scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of FRID Tags. In: The 12th Annual Workshop on Selected Areas in Cryptography. LNCS, Springer, Heidelberg (2005)

    Google Scholar 

  13. Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  14. Tyyls, P., Batina, L.: RFID-tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, Springer, Heidelberg (2006)

    Google Scholar 

  15. NTRU. GenuID, http://www.ntru.com/products/genuid.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Frode Eika Sandnes Yan Zhang Chunming Rong Laurence T. Yang Jianhua Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liang, Y., Rong, C. (2008). RFID System Security Using Identity-Based Cryptography. In: Sandnes, F.E., Zhang, Y., Rong, C., Yang, L.T., Ma, J. (eds) Ubiquitous Intelligence and Computing. UIC 2008. Lecture Notes in Computer Science, vol 5061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69293-5_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69293-5_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69292-8

  • Online ISBN: 978-3-540-69293-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics