Abstract
Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Conference on Computer and Communications Security – CCS, pp. 210–219. ACM Press, New York (2004)
Hennig, J.E., Ladkin, P.B., Siker, B.: Privacy Enhancing Technology Concepts for RFID Technology Scrutinized (2005)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Claburn, T., Hulme, G.V.: Security Challenge- Security and its high cost appears to be the next hurdle in the widespread adoption of RFID. InformationWeek, http://www.informationweek.com/story/showArticle.jhtml?articleID=52601030 (Accessed on November 15, 2004)
Chung, K.: Relational Check Code. Awaiting US Patent
CAST Inc. AES and SHA-1 Crypto-processor Cores, http://www.cast-inc.com/index.shtml
Gao, X., Xiang, Z., Wang, H., Shen, J., Huang, J., Song, S.: An Approach to Security and Privacy of RFID Systems for Supply Chain. In: Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (2003)
Weis, S.: Security and Privacy in Radio-Frequency Identification Devices. Massachusetts Institute of Technology (2003)
Henrici, D., Müller, P.: Tackling Security and Privacy Issues in Radio Frequency Identification Devices. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001, pp. 219–224. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Potdar, V., Wu, C., Chang, E. (2005). Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_40
Download citation
DOI: https://doi.org/10.1007/11596981_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)