Skip to main content

Mobile RFID Applications and Security Challenges

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4296))

Abstract

With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers, mobile phones provide an user-friendly approach to quickly and efficiently scan, access and view information about RFID tagged items. As RFID tags, mobile phones can quickly identify themselves in order to communicate with other tagged devices, which provide essential services. At the outset this paper briefly describes Mobile RFID technology and compare it with conventional RFID technology. We pioneer in categorizing Mobile RFID applications into three distinct zones, namely: Location-based Services (LBS) Zone, Enterprise Zone, and Private Zone. We describe application scenarios related to these zones and highlight various security and privacy threats. Finally, we propose a security architecture for LBS zone and describe our future work.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sweeney II, P.J.: RFID for Dummies. Wiley Publishing Inc., Chichester (2005)

    Google Scholar 

  2. Juels, A.: RFID Security and Privacy: A Research Survey, RSA Laboratories (2005)

    Google Scholar 

  3. EPCglobal Web site (2005), http://www.EPCglobalinc.org

  4. EPCglobal Inc., Class 1 generation 2 UHF air interface protocol standard version 1.0.9. (2005), Referenced 2005 at: http://www.epcglobalinc.org/standards/

  5. VeriSign, The EPCglobal Network: Enhancing the Supply Chain, White Paper 2005, http://www.verisign.com/stellent/groups/public/documents/white_paper/002109.pdf

  6. EPCglobal Specification, EPCglobal Architecture Framework Version 1.0, http://www.epcglobalinc.org/standards/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Konidala, D.M., Kim, K. (2006). Mobile RFID Applications and Security Challenges. In: Rhee, M.S., Lee, B. (eds) Information Security and Cryptology – ICISC 2006. ICISC 2006. Lecture Notes in Computer Science, vol 4296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11927587_17

Download citation

  • DOI: https://doi.org/10.1007/11927587_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49112-5

  • Online ISBN: 978-3-540-49114-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics