Radio frequency identification (RFID) technology is not fundamentally new and concerns a whole range of applications. The first RFID application may have been the Royal British Air Force’s “Identify Friend or Foe” system, which was used during the Second World War to identify friendly aircraft. RFID can be applied to a variety of tasks, structures, work systems, and contexts along the value chain, including business-to-business (B-2-B) logistics, internal operations, business-toconsumer (B-2-C) marketing, and after-sales service applications [1–6]. However, the boom that RFID technology enjoys today is basically due to the standardization [7] and development of low cost devices.
Like every wireless device, RFID systems bring with them security and privacy issues to all those people who have been working in this area. Security issues involve classic attacks, namely denial of service, impersonation of tags, or channel eavesdropping. These attacks are rendered more practicable because of the tags’ lack of computational and storage capacity. There are many papers investigating these issues in various ways [7, 8, 10–12, 14]. Today’s challenge is to find protocols (or deployments) which allow authorized parties to identify the tags without an adversary being able to track them, thus getting to the root of the privacy problem [8, 13]. It is well known that the reason not to use well known authentication protocols is that such protocols do not preserve the privacy of the provider. Asymmetric cryptography could easily solve this problem, but it is too heavy to be implemented within a tag.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Huber GP (1991) Organizational learning: contributing processes and the literatures. Org Sci 2(1):88–115
Standford V (2003) Pervasive computing goes the last hundred feet with RFID systems, IEEE Perv Comp 2:2
Angeles R (2005) RFID technologies: supply-chain applications and implementation issues, Info Sys Mgmt 22:1 pp 51–65
Thompson CA (2004) Radio frequency tags for identifying legitimate drug products discussed by tech industry, Amer J Health-Sys Pharm 61(14): 1430–1431
Yang G, Jarvenpaa SI (2005) Trust and radio frequency identification (RFID) adoption within an alliance, In: Sprague R, ed Proc 38th Hawaii Intl Conf Sys Sci, Big Island, HI, January 2005, pp 855–864, IEEE Comp Soc Press, Los Alamitos, CA, USA
Bono S, Green M, Stubblefield A, Juels A, Rubin A, Szydlo M (2005) Security analysis of a cryptographically-enabled RFID device, In: 14th USENIX security symposium, pp 1–16, Baltimore, Maryland, USA
Electronic Product Code Global Inc http://www.epcglobalinc.org
Avoine G (n.d.) Security and privacy in RFID systems. Online bibliography available at http://lasecwww.epfl.ch/~gavoine/rfid/
Molnar D, Wagner D (2004) Privacy and security in library RFID: issues, practices, and architectures. In: Pfitzmann B, Liu P, ed, Conference on computer and communications security - CCS’04, pp 210–219, ACM Press, Washington, DC, USA
Golle P, Jakobsson M, Juels A, Syverson P (2004) Universal reencryption for mixnets. In: Okamoto T, ed, The Cryptographers track at the RSA conference, CT-RSA, Lecture notes in computer science, 2964:163–178, San Francisco, California, USA, Springer-Verlag
Henrico D, Muller P (2004) Tackling security and privacy issues in radio frequency identification devices. In: Ferscha A, Mattern F, ed, Pervasive computing, Lecture Notes in Computer Science 3001:219–224, Vienna Austria, Springer-Verlag
Ohkubo M, Suzuki K, Kinoshita S (2003) Cryptographic approch to “privacy-friendly” tags. In: RFID privacy workshop, MIT, Massachusetts, USA
Avoine G, Oechslin P (2005) A scalable and provably secure hash based RFID protocol. In: International workshop on pervasive computing and communication security, PerSec, pp 110–114, Kauai Island, Hawaii, USA, IEEE Computer Society Press
Huang X, Sharma D (2006) Investigating security in multi-tree based technique. In:. Gabrys B, Howlett RJ, Jain LC (eds) RFID systems. KES 2006 Part III. LNAI 4253:1151–1156. Springer-Verlag, Berlin, Heidelberg
Hull J (2000) Options, futures, and other derivatives, Fifth Ed, Prentice-Hall, pp 574–577
Heath D, Jarrow R, Morton A (1992) Bond pricing and the term structure of interest rates: a new methodology, Econometrica 60(1):77–105
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Huang, X. (2008). HJM Tree for Security Analyses of Passive RFID Systems. In: Huang, X., Chen, YS., Ao, SI. (eds) Advances in Communication Systems and Electrical Engineering. Lecture Notes in Electrical Engineering, vol 4. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-74938-9_10
Download citation
DOI: https://doi.org/10.1007/978-0-387-74938-9_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-74937-2
Online ISBN: 978-0-387-74938-9
eBook Packages: EngineeringEngineering (R0)