Enabling Trust and Privacy for RFID System

被引:0
作者
Mubarak, Mohd Faizal [1 ,3 ]
Ab Manan, Jamalul-lail [2 ]
Yahya, Saadiah [3 ]
机构
[1] MIMOS Bhd, Informat Commun Technol Div, 57000 Technol Pk Malaysia, Kuala Lumpur, Malaysia
[2] MIMOS Bhd, Adv Anal & Modeling Cluster, 57000 Technol Pk Malaysia, Kuala Lumpur, Malaysia
[3] Univ Teknol MARAMalaysia, Fac Math & Comp Sci, Shah Alam 40450, Malaysia
来源
2012 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA) | 2012年
关键词
RFID; Security; Privacy; Integrity; Integrated RFID system; Anonymizer; AUTHENTICATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Future generation of RFID technology is moving towards integration with other systems. This new technology integration trend creates more benefits to user because potentially many problems could be solved in one integrated system. The integration of RFID with other systems is advantageous to users because it could use its unique contactless communication ability for numerous sectors of the community. Unfortunately, this special ability of RFID system is vulnerable because the tag can be tracked by adversary who then exploits and abuse data and location privacy. Past works on privacy-preserving RFID protocols have dealt with lots of issues regarding trust and availability. In this paper, we stress the importance of trust and privacy. We believe that data anonymity must be strengthened with integrity verification in every platform (machine or device) to avoid any untrusted platform from becoming threat to others. One such threat could be in the form of adversary making use of the privacy technique to hide its real identity. We believe that integrity verification which forms trust establishment for the system is crucial. Trust and privacy are usually contradictory in their mechanism, so we need to harmonize them to effectively protect user data. Therefore, we propose a hybrid technique for establishment of trust and privacy in RFID system. We also do trust and privacy analysis on our proposed model.
引用
收藏
页码:799 / 804
页数:6
相关论文
共 23 条
  • [1] Ab J. Manan, 2011, C COMM INF TECHN WSE
  • [2] [Anonymous], 2004, P 11 ACM C COMPUTER, DOI [DOI 10.1145/1030083.1030125, 10.1145/1030083.1030125]
  • [3] Armknecht F., 2010, 6 WORKSH RFID SEC RF
  • [4] Armknecht F, 2010, LECT NOTES COMPUT SC, V6123, P493, DOI 10.1007/978-3-642-13708-2_29
  • [5] Asadpour M., 2011, 2001 INT JOINT C IEE
  • [6] Barber R, 2001, COMPUT FRAUD SECUR, P9
  • [7] Brickell E., 2004, P ACM C COMP COMM SE, P132, DOI DOI 10.1109/TSC.2010.60
  • [8] Challener David., 2008, PRACTICAL GUIDE TRUS
  • [9] Chen Liqun., 2006, STC 06 P 1 ACM WORKS, P7
  • [10] Dietrich K., 2010, WORKSH RFID SEC 2010