Browse > Article

A Management Method for Personal Purchases in Mobile RFID System  

Kim, Tae-Sung (Yonsei University, Electrical and Electronic Engineering, Wireless & Internet Lab)
Sohn, Kyung-Ho (Yonsei University, Electrical and Electronic Engineering, Wireless & Internet Lab)
Yoon, Kang-Jin (Yonsei University, Electrical and Electronic Engineering, Wireless & Internet Lab)
Kim, Young-Yong (Yonsei University, Electrical and Electronic Engineering, Wireless & Internet Lab)
Abstract
Radio frequency identification(RFID) system can identify an object using wireless transmission. RFID applications are numerous and far reaching. The most interesting and widely used applications are supply chain management for companies. Currently, RFID tags must be detached or killed for security and privacy reasons when tagged objects are purchased. In this paper, we present a new architecture that transfers information about products from the electronic product code information services (EPCIS) server of a company to an individual's personal purchases management (PPM) server when products with RFID codes are sold. It solves the security and privacy issues without detaching the tag. Moreover, the PPM server described in this paper allows customers to handle the expiration dates, updates, location management, and group management of products.
Keywords
RFID System; Middleware; EPC; EPCIS;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. P. Fishkin and S. Roy," "Enhancing RFID Privacy via Antenna Energy Analysis", IRS-TR-03-012, Intel Research Seattle.2003.
2 L. Hyanjin, K. Jeeyeon, "Privacy threats and issues in mobile RFID", Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on 20-22 April 2006 Page(s):5 pp. Digital Object Identifier 10.1109/ ARES.2006.96
3 K. Traub, G. Allgair, H. Barthel,"The EPCglobal Architecture Framework", EPCglobal Final Version of 1 July 2005, http://www.epcgloblinc. orgtstandards/Final-epcglbal =arch-20050701.pdf.
4 http://www.ietf.org/rfc/rfc3963.txt'' Network Mobility (NEMO) Basic Support Protocol"
5 A. Juels, R. L. Rivest and M. Szydlo, "The Blocker Tag : Selective Blocking of RFID Tags for Consumer Privacy", In Proceedings of 10th ACM Conference on computer and Communications Security(CCS 2003), 2003.
6 T. Phillips, Karygiannis, R. Kuhn, "Security Standards for the RFID Market", Security & Privacy Magazine, IEEE Volume 3, Issue 6, Nov.-Dec, 2005 Page(s):85-89 Digital Object Identifier 10.11 09/MSP.2005.157.   DOI   ScienceOn
7 http://www.epcglobalinc.orgtabout/media_centre /Network_Security _Final.pdf
8 George Roussos, "Enabling RFID in retail" Volume 39, Issue 3, March 2006 Page(s):25-30 Digital Object Identifier 10. 1109/MC.2006.88.