An Exploration of RFID Information Security and Privacy

被引:2
|
作者
Chen, Chih-Yung [1 ]
Kuo, Chien-Ping [2 ]
Chien, Fang-Yuan [2 ]
机构
[1] St Johns Univ, Dept Informat Management, Collegeville, MN 56321 USA
[2] St Johns Univ, Dept Elect Engn, Collegeville, MN 56321 USA
关键词
RFID; Information Security; Privacy; EPC; Tag;
D O I
10.1109/JCPC.2009.5420211
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The application of RFID after years of development, there are many cases of the industries applied, and Tag is considered to be the next generation of Barcode. However, the RFID is via transmission of radio frequency manner, so hacker could obtain information through the analysis way of frequency signal. The personal privacy will be violated if used in the user's privacy information and transmission without any protective measures to protect. RFID data transmission and storage with hardware ways to achieve the security of information is the best way, but this had been in the problem of Tag costs and capacity. The study taking from the applications ways is to achieve RFID information security and privacy, and do the information securities between the low-cost Tag and the Reader. The study submitted an EPC specification and combined with XOR logical applications to achieve privacy by the way of discussion currently.
引用
收藏
页码:65 / +
页数:2
相关论文
共 50 条
  • [41] PUF-enhanced offline RFID security and privacy
    Kardas, Suleyman
    Celik, Serkan
    Yildiz, Muhammet
    Levi, Albert
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 2059 - 2067
  • [42] New approaches for better security and privacy in RFID communications
    Chavan, Kaushik
    Zeid, Abe
    Kamarthi, Sagar
    27TH COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, VOL 2, PTS A AND B 2007: PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2008, : 11 - 17
  • [43] Enhancing RFID Security and Privacy by Physically Unclonable Functions
    Sadeghi, Ahmad-Reza
    Visconti, Ivan
    Wachsmann, Christian
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 281 - 305
  • [44] Roadmap to solving security and privacy concerns in RFID systems
    University of the South Pacific, Fiji
    Comput Law Secur Rep, 2007, 6 (555-561):
  • [45] eRIPP-FS: Enforcing privacy and security in RFID
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi V.
    Spognardi, Angelo
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (01) : 58 - 70
  • [46] Enhancing Privacy and Security in RFID-Enabled Banknotes
    Yang, Ching-Nung
    Chen, Jie-Ru
    Chiu, Chih-Yang
    Wu, Gen-Chin
    Wu, Chih-Cheng
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 439 - 444
  • [47] Security and Privacy Protocol for Emerging Smart RFID Applications
    Sadikin, Mohammad Fal
    Kyas, Marcel
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 129 - 135
  • [48] A holistic approach examining RFID design for security and privacy
    Tim Good
    Mohammed Benaissa
    The Journal of Supercomputing, 2013, 64 : 664 - 684
  • [49] Are RNGs Achilles’ Heel of RFID Security and Privacy Protocols?
    Atakan Arslan
    Süleyman Kardaş
    Sultan Aldırmaz Çolak
    Sarp Ertürk
    Wireless Personal Communications, 2018, 100 : 1355 - 1375
  • [50] An improved approach to security and privacy of RFID application system
    Zhang, L
    Zhou, HB
    Kong, RS
    Yang, F
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1149 - 1152