Browse > Article
http://dx.doi.org/10.9708/jksci.2010.15.8.107

A Secure Technique Design for Privacy Protection in RFID System  

Oh, Gi-Oug (안양대학교 교양학부)
Park, Mi-Og (성결대학교 컴퓨터공학부)
Abstract
RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.
Keywords
Privacy; Tracking; Gray Code; Hash; RFID protocol;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Sarma, S. et al., "RFID Systems and Security and Privacy Implications, Workshop on Cryptographic Hardware and Embedded Systems," pages 454-470, Lecture Notes in Computer Society, pp. 149–153. Computer Science, 2002
2 Weis, S. et al., "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," First Intern. Conference on Security in Pervasive Computing (SPC), 2003
3 Kabatianski, Smeets, Johansson, "On the cardinality of systematic authentification codes via error correcting codes." In IEEE Trans on Info TheoryIT42, pp. 566-578, 1996.
4 Moshe Schwartz and Tuvi Etzion, "The Structure of Single-Track Gray Codes," IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, Nov. 1999.
5 Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," 1st International Conference on Security in Pervasive
6 남용택, 장종수, 손승원, "유비쿼터스 환경에서의 개인정보보호기술," 전자통신동향분석, 제 20권 제1호 2005년 2월   과학기술학회마을
7 오기욱, "그레이코드를 이용한 RFID 보안 프로토콜과 시스템 설계," 숭실대학교 박사학위논문, 2007년
8 B. J. Feder, "Delta to Invest in radio Tags for Luggage at Airports," The New York Times, July 1, 2004. packages, CNET, 2003
9 Blum, A., Kalai, A., and Wasserman, H. "Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model." Journal of the ACM 50, 4, pp 506-519, July 2003.   DOI   ScienceOn
10 Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., and Szydlo, M., "Security Analysis of a Cryptographically-Enabled RFID Device." In USENIX Security (2005).
11 Yagni_Home, http://yagni.com/graycode/index.html
12 강전일, 박주성, 양대헌, "RFID 시스템에서 프러이버시 보호기술," 정보보호학회지, 제 14권 제 6호, 2004년 12월.