Abstract
Recently, RFID (Radio Frequency Identification) technology is practically applied to a number of logistics processes as well as asset management, and RFID is also expected to be permeated in our daily life with the name of ’Ubiquitous Computing’ or ‘Ubiquitous Network’ within the near future. The R&D groups in global now have paid attention to integrate RFID with mobile devices as well as to associate with the existing mobile telecommunication network. Such a converged technology and services would lead to make new markets and research challenges. However, the privacy violation on tagged products has become stumbling block. We propose light-weight security mechanism which is constructed by mobile RFID security mechanism based on WIPI (Wireless Internet Platform for Interoperability). WIPI-based light-weight mobile RFID security platform can be applicable to various mobile RFID services that required secure business applications in mobile environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Tsuji, T., Kouno, S., Noguchi, J., Iguchi, M., Misu, N., Kawamura, M.: Asset management solution based on RFID. NEC Journal of Advanced Technology 1(3), 188–193 (Summer 2004)
Sullivan, L.: Middleware enables RFID tests. Informationweek, no. 991 (2004)
Jin, S., et al.: Cluster-based Trust Evaluation Scheme in Ad Hoc Network. ETRI Journal 27(4), 465–468 (2005)
Han, W.Y., et al.: A Gateway and Framework for Telematics Systems Independent on Mobile Networks. ETRI Journal 27(1), 106–109 (2005)
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT (2002)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to “Privacy-Friendly” Tags. In: RFID Privacy Workshop (2003)
Hennig, J.E., Ladkin, P.B., Siker, B.S.: Privacy Enhancing Technology Concepts for RFID Technology Scrutinised, RVS-RR-04-02, October 28 (2004)
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFIDTags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security (2003)
Juels, A., Pappu, R.: Squealing RFID-Enabled Banknotes. In: Wright, R. (ed.) Financial Cryptography (2003)
Oh, S.-W., Chae, J.-S.: Information Report on Mobile RFID in Korea. ISO/IEC JTC1 SC31 WG4, Report (2005)
Min, K.W., Chai, S.B., Kim, S.: An Analog Front-End Circuit for ISO/IEC 14443-compatible RFID Interrogators. ETRI Journal 26(6), 560–564 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, N., Kwak, J., Kim, S., Won, D., Kim, H. (2006). WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment . In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_100
Download citation
DOI: https://doi.org/10.1007/11610496_100
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31158-4
Online ISBN: 978-3-540-32435-5
eBook Packages: Computer ScienceComputer Science (R0)