Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.5.141

Secure RFID-based Payment System against Various Threats  

Kim, In-Seok (Financial Supervisory Service)
Choi, Eun-Young (Korea University)
Lee, Dong-Hoon (Korea University)
Lim, Jong-In (Korea University)
Abstract
Barcodes have been widely used to implement automatic identification systems but there are various problems such as security weakness or distance restriction in scanning barcode signals in a barcode-based automatic identifcation systems. Recently researchers are gradually interested in radio frequency identification (RFID) and RFID systems have been applied to various fields than before. Especially one of RFID application fields, a bank system uses RFID tagged bankontes to prevent illegal transactions such as counterfeiting banknotes and money laundering. In this paper, we propose a RFID system for protecting location provacy of a banknote holder. In addition, our paper describes that a trust party can trace a counterfeit banknote holder to provide against emergencies.
Keywords
RFID; banknote;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Feldhofer, S. Dominikus, and J. Wolker storfer. Strong Authentication for RFID Systems using the AES Algorithm. CHES04 , LNCS 3156, pp. 357-370, Springer-Verlag, 2004
2 Auto-ID Center, 860Mhz-960MHz Class I Radio Frequency Identification Tag Radio Frequency and Logical communication Interface Specification Proposed Re-commendation Version 1.0.0. Technical Report MIT-AUTOID-TR-007. AutoID Center, MIT, 2002
3 S. A. Weis, S. E. Sarma, S. A. Weis and D. W. Engels. Security and privacy Aspects of Low-Cost Radio Frequency Identification Systems. First International Conference on Security in Pervasive Computing, 2003. http://theory.lcs.mit.edu/sweis/spc-rfid.pdf
4 D. Henrici and P. Muller. Hash-based Enhance ment of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. PerSec'04 at IEEE PerCom. pp. 149-153, 2004
5 A. Juels, R. L. Rivest and M. Szudlo. The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy. In the 8th ACM Conference on Computer and Communications Security, pp. 103-111, ACM Press. 2003
6 S. Junichiro, R. Jae-Cheol and S. Kouichi. Enhancing privacy of Universal Re-encryption scheme for RFID Tags. EUC 2004, Vol. 3207 LNCS, pp. 879-890, Springer-Verlag, 2004
7 X. Zhang and B. King. Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. Information Security Conference, 2005
8 G. Avoine. Privacy Issues in RFID Banknote Protection Schemes. Cardis'04, Kluwer, pp. 33-48, 2004
9 R. Keunwoo, K. Jin, K. Seungjoo and W. Dongho. Challenge-Response based secure RFID Authentication Protocol for Distributed Database Environment. SPC2005, Vol. 3450 LNCS, pp. 70-84, Springer-Verlag, 2005
10 G. Avoine and Ph. Ocehslin, A Scalable and Provably Secure Hash-Based RFID Protocol. PerSec 2005, IEEE Computer Society Press, Kauai Island, Hawaii, USA, 2005
11 A. Juels and R. Pappu. Squealing euros: Privacy protection in RFIDenabled banknotes. Financial Cryptography(FC'03), Springer - Verlag, LNCS 2742. pp. 103-121, 2003
12 M. Ohkubo, K. Suxuki and S. Kinoshita. 'Efficient Hash-Chain Based RFID Privacy Protection Scheme', Ubcomp2004 workshop
13 A. Juels. Minimalist cryptography for Low-Cost RFID Tags. In The Fourth International Conferecne on Security in Communication Networks-SCN 2004, vol. 3352 LNCS, pp. 149-164, Springer-Verlag. 2004
14 L. Su Mi, H. Young Ju, L. Dong Hoon and L. Jong In. Efficient authentication for Low-Cost RFID systems. ICCSA05, vol. 3480 LNCS, pp. 619-629, 2005
15 유성호, 김기현, 황용호, 이필중. 상태 기반 RFID 인증 기법 프로토콜. 정보보호학회논문지, 제 4권, 6호, 2004