Browse > Article

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems  

Kang, Jin-Suk (Computer Science and Engineering, University of Incheon)
Choi, Yong-Sik (Computer Science and Engineering, University of Incheon)
Sung, Mee-Young (Computer Science and Engineering, University of Incheon)
Shin, Seung-Ho (Computer Science and Engineering, University of Incheon)
Jeong, Tai-Keong T. (Dept. of Communications Eng., Myongji University)
Abstract
Recently, ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.
Keywords
USN(Ubiquitous Sensor Network); HASH LOCK Approach; HASH Function;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Sarma, D. Brock, D. Engels, 'Radio frequency identification and the electronic product code,' Micro, IEEE, vol. 21, no. 6, Nov. - Dec. 2001, pp.50 - 54   DOI   ScienceOn
2 MIT Auto-ID Center. http://www.autoidcenter.org Feb 2004
3 D. Boneh, P. Golle, 'Almost Entirely Correct Mixing With Applications to Voting,' Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp. 68 - 77
4 Steven A. Weis, 'Security and Privacy in Radio-Frequency Identification Devices' MIT Master of Science Thesis, submitted May 2003
5 T, McConnel, 'RFID advances bring fundamental changes to security and personal safety,' http://www.iapplianceweb.com/story/OEG20030604 S0047, June 6, 2003
6 S.A.Weis, S.E.Sarma, R.L. Revest, D.W. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems ' accepted for publication to the First International Conference on Security in Pervasive Computing (SPC 2003), March 12-14, 2003
7 K. Takaragi, M. Usami, R. Imura, R. Itsuki, T. Satoh, 'An ultra small individual recognition security chip,' Micro, IEEE Nov/Dec 2001 Pages 43 - 49, Volume 21, Issue 6   DOI   ScienceOn
8 A. Juels, R. Pappu, 'Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.' In R. Wright, ed., Financial Cryptography ' 03. Pringer-Verlag. 2003
9 S. Sarma, S. Weis, D. Engels, 'Radio-frequency identifiers: Security Risks and Challenges,' CryptoBytes, vol. 6, no. 1, Spring 2003
10 D. McCullough. RFID tags: Big Brother in small packages. CNet, 13 January 2003. From http://news.com.com/2010-1069-980325.html
11 J. Hoffstein, J. Pipher, J. H. Silverman, 'NTRU: A Ring-Based Public Key Cryptosystem.' Lecture Notes in Computer Science, 1423:267, 1998