Abstract
Mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and profiling using RFID technology. Therefore, in this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID service which complies with the Korea’s mobile RFID forum standard.
Keywords
- Privacy Protection
- Application Service Provider
- Mobile Telecommunication Service
- Reader Terminal
- Privacy Protection Policy
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download to read the full chapter text
Chapter PDF
References
Tsuji, T., Kouno, S., Noguchi, J., Iguchi, M., Misu, N., Kawamura, M.: Asset management solution based on RFID. NEC Journal of Advanced Technology 1(3), 188–193 (summer, 2004)
Chae, J., Oh, S.: Information Report on Mobile RFID in Korea. ISO/IEC JTC 1/SC 31/WG 4 N 0922, Information paper, ISO/IEC JTC 1 SC 31 WG4 SG 5 (2005)
Jin, S., et al.: Cluster-based Trust Evaluation Scheme in Ad Hoc Network. ETRI Journal 27(4), 465–468 (2005)
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT (2002)
Choi, W., et al.: An RFID Tag Using a Planar Inverted-F Antenna Capable of Being Stuck to Metallic Objects. ETRI Journal 28(2), 216–218 (2006)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-Friendly Tags. In: RFID Privacy Workshop (2003)
Ahn, J., et al.: An Analysis of Consumer Preferences among Wireless LAN and Mobile Internet Services. ETRI Journal 28(2), 205–215 (2006)
Park, W., Lee, B.: Proposal for participating in the Correspondence Group on RFID in ITU-T. Information Paper. ASTAP Forum (2004)
Yoo, S.: Mobile RFID Activities in Korea. The APT Standardization Program (2006)
Park, N., Kwak, J., Kim, S., Won, D.H., Kim, H.W.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)
Chug, B., et al.: Proposal for the study on a security framework for mobile RFID applications as a new work item on mobile security. ITU-T, COM17D116E, Geneva (2005)
MRF Forum: WIPI C API Standard for Mobile RFID Reader (2005)
MRF Forum: WIPI Network APIs for Mobile RFID Services (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, N., Kim, S., Won, D., Kim, H. (2006). Security Analysis and Implementation Leveraging Globally Networked RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds) Personal Wireless Communications. PWC 2006. Lecture Notes in Computer Science, vol 4217. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11872153_43
Download citation
DOI: https://doi.org/10.1007/11872153_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-45174-7
Online ISBN: 978-3-540-45176-1
eBook Packages: Computer ScienceComputer Science (R0)