DOI QR코드

DOI QR Code

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee (Division of Information Technology Engineering, Soonchunhyang University) ;
  • Lee, Im-Yeong (Division of Information Technology Engineering, Soonchunhyang University)
  • Published : 2005.12.01

Abstract

Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

Keywords

References

  1. Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, 'Cryptographic Approach to 'Privacy- Friendly' Tag' RFID Privacy Workshop@MIT, Nov, 2003
  2. Sanjay E.Sarma, Stephen A. Weis and Daniel W. Engels, 'Radio-Frequency Identification : Secure Risks and Challenges', RSA Laboratories Cryptobytes, vol. 6, no.1, pp.2-9. Spring 2003
  3. Sanjay E.Sarma, Stephen A. Weis and Daiel W. Engels, 'Radio-frequency identification systems', In Pro-ceeding of CHES '02, pp454-469. Springer- Verlag, 2002. LNCS no. 2523
  4. Sanjay E.Sarma, 'Towards the five-cent Tag', Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001
  5. Stephen A. Weis, 'Security and Privacy in Radio- Frequency Identification Devices', Masters Thesis. MIT. May, 2003
  6. Stephen A. Weis, Sanjay E.Sarma, Ronald L. Rivest and Daiel W. Engels, 'Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems', First International Conference on Security in Pervasive Computing, 2003. http://theory.lcs.mit.edu/ sweis/spcrfid.pdf
  7. MIT Auto-ID Center. http://www.autoidcenter.org

Cited by

  1. Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing vol.10, pp.1, 2014, https://doi.org/10.1155/2014/389476
  2. A Study of Smart Power Control Algorithm Using RF Communication in Smart Home Environment vol.9, pp.12, 2013, https://doi.org/10.1155/2013/690902
  3. A Study on Intelligent User-Centric Logistics Service Model Using Ontology vol.2014, 2014, https://doi.org/10.1155/2014/162838
  4. A Survey of RFID Deployment and Security Issues vol.7, pp.4, 2011, https://doi.org/10.3745/JIPS.2011.7.4.561
  5. Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography vol.2015, 2015, https://doi.org/10.1155/2015/807213