Skip to main content

Dynamic Privacy Protection for Mobile RFID Service

  • Chapter
RFID Security

Abstract

Recently, mobile RFID has been studied actively as a primary technology in computing environments. The mobile RFID service is defined as a special type of mobile service using RFID tag packaging objects and RFID readers attached to mobile RFID terminals. While the mobile RFID system has many advantages, it may make new intrusions to the user’s privacy. We propose the policy-based dynamic privacy protection framework leveraging globally mobile RFIDs. In this paper, we describe privacy infringements for the mobile RFID service environment and requirements for personal privacy protection, and develop privacy protection service based on a user privacy policy. The proposed framework provides a means for securing the stability of mobile RFID services by suggesting personal privacy-policy-based access control for personalized tags. This means a technical solution to privacy protection for the mobile RFID service system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Chapter 10-References

  1. An Y., Oh S. (2005) RFID System for User's Privacy Protection. 2005 Asia-Pacific Conference on Communications, Perth, Western Australia, 3–5 October 2005

    Google Scholar 

  2. Avoine G., Oechslin P. (2005). RFID traceability: A multilayer problem. In Andrew Patrick and Moti Yung, editors, Financial Cryptography - FC'05. Lecture Notes in Computer Science, vol. 3570, Springer, Berlin, pp. 125–140

    Google Scholar 

  3. Chae J., Oh S. (2005) Information Report on Mobile RFID in Korea. ISO/IEC JTC1/SC 31/WG4 N0922, Information Paper, ISO/IEC JTC1 SC31 WG4 SG 5

    Google Scholar 

  4. Choi D., Kim H., Chung K. (2007) Proposed Draft of X.rfidsec-1: Privacy Protection Frame-work for Networked RFID Services. ITU-T, COM17C107E, Q9/17, Contribution 107, Geneva

    Google Scholar 

  5. Chug B. et al. (2005) Proposal for the Study on a Security Framework for Mobile RFID Applications as a New Work Item on Mobile Security. ITU-T, COM17D116E, Q9/17, Contribution 116, Geneva

    Google Scholar 

  6. Finkenzeller K. (2003) RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, Wiley, New York

    Google Scholar 

  7. Garfinkel S., Rosenberg B. (2005) RFID: Applications, Security, and Privacy, Addison-Wesley, Reading, MA

    Google Scholar 

  8. Garfinkel S., Juels A., Pappu R. (2005) RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy 3(3): 34–43

    Article  Google Scholar 

  9. ITU-T TSAG (2005) A Proposed New Work Item on Object/ID Associations

    Google Scholar 

  10. ITU-T TSAG RFID CG Deliverable (2006) Review Report of Identification Based Business Models and Service Scenarios

    Google Scholar 

  11. Kim Y., Koshizuka N. (2006) Review report of Standardization Issues on Network Aspects of Identification Including RFID. ITU-T, Paper TD315

    Google Scholar 

  12. Kim Y., Lee J., Yoo S., Kim H. (2006) A Network Reference Model for B2C RFID Applications. Proceedings of ICACT 2006

    Google Scholar 

  13. Konidala D.M., Kim K. (2006) Mobile RFID Security Issues. Proceeding of Symposium on Cryptography and Information Security

    Google Scholar 

  14. Kwak J., Rhee K., Oh S., Kim S., Won D. (2005) RFID System with Fairness within the Framework of Security and Privacy. Lecture Notes in Computer Science, vol. 3813, Springer, Berlin, pp. 142–152

    Google Scholar 

  15. Lee J., Kim H. (2006) RFID Code Structure and Tag Data Structure for Mobile RFID Services in Korea. Proceedings of ICACT 2006

    Google Scholar 

  16. Lee H., Kim J. (2006) Privacy Threats and Issues in Mobile RFID, Proceedings of the First International Conference on Availability, Reliability and Security, vol. 1

    Google Scholar 

  17. Lee B., Kim H., Chung K. (2006) The design of dynamic authorization model for user centric service in mobile environment, Proceedings of ICACT 2006, vo1. 3, pp. 20–22

    Google Scholar 

  18. MIC (Ministry of Information and Communication) of Korea (2005) RFID Privacy Protection Guideline. MIC Report Paper 2005

    Google Scholar 

  19. Mobile RFID Forum of Korea (2005) WIPI C API Standard for Mobile RFID Reader. Standard Paper

    Google Scholar 

  20. Mobile RFID Forum of Korea (2005) WIPI Network APIs for Mobile RFID Services. Standard Paper

    Google Scholar 

  21. Mobile RFID Forum of Korea (2005) Mobile RFID Code Structure and Tag Data Structure for Mobile RFID Services. Standard Paper, http://www.mrf.or.kr

  22. Mobile RFID Forum of Korea (2005) Access Right Management API Standard for Secure Mobile RFID Reader, MRFS-4–03. Standard Paper. http://www.mrf.or.kr

  23. Mobile RFID Forum of Korea (2005) HAL API Standard for RFID Reader of Mobile Phone, Standard Paper

    Google Scholar 

  24. Mobile RFID Forum of Korea(2005) WIPI API for Mobile RFID Reader Device, Standard Paper

    Google Scholar 

  25. Nokia. RFID Phones - Nokia Mobile RFID Kit, http://europe.nokia.com/nokia

  26. Ohkubo M., Suzuki K., Kinoshita S. (2003) Cryptographic Approach to ‘Privacy-Friendly' Tags. RFID Privacy Workshop 2003

    Google Scholar 

  27. Park W., Lee B. (2004) Proposal for Participating in the Correspondence Group on RFID in ITU-T. Information Paper. ASTAP Forum

    Google Scholar 

  28. Park B., Lee S., Youm H. (2006) A Proposal for Personal Identifier Management Framework on the Internet. ITU-T, COM17-D165

    Google Scholar 

  29. Park N., Kwak J., Kim S., Won D., Kim H. (2006) WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. Lecture Notes in Computer Science, vol. 3842, Springer, Berlin, pp. 741–748

    Google Scholar 

  30. Park N., Kim S., Won D., Kim H. (2006) Security Analysis and Implementation leveraging Globally Networked Mobile RFIDs. Lecture Notes in Computer Science, vol. 4217, Springer, Berlin, pp. 494–505

    Google Scholar 

  31. Sakurai Y., Kim H. (2006) Report for Business Models and Service Scenarios for Network Aspects of Identification (Including RFID). ITU-T, TSAG TD 314

    Google Scholar 

  32. Sarma S.E., Weis S.A., Engels D.W. (2002) RFID Systems, Security and Privacy Implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT, Cambridge, MA

    Google Scholar 

  33. Shepard S. (2005) RFID: Radio Frequency Identification. McGraw-Hill, New York, NY

    Google Scholar 

  34. Son M., Lee Y., Pyo C. (2006) Design and Implementation of Mobile RFID Technology in the CDMA Networks, Proceedings of ICACT 2006

    Google Scholar 

  35. Strandburg K.J., Raicu D.S.(2005) Privacy and Technologies of Identity: A Cross-Disciplinary Conversation, Springer, Berlin

    Google Scholar 

  36. Sullivan L. (2004) Middleware Enables RFID Tests. Information Week, No. 991

    Google Scholar 

  37. Thornton F. et al. (2006) RFID Security, Syngress, Rockland, MA

    Google Scholar 

  38. Tsuji T., Kouno S., Noguchi J., Iguchi M., Misu N., Kawamura M. (2004) Asset management solution based on RFID. NEC Journal of Advanced Technology 1(3): 188–193

    Google Scholar 

  39. Tsukada M., Narita A. (2006) Development Models of Network Aspects of Identification Systems (Including RFID) (NID) and Proposal on Approach for the Standardization. ITU-T, JCA-NID Document 2006-I-014

    Google Scholar 

  40. Weis S. et al. (2003) Security and Privacy Aspects of Low-Cost Radio Frequency identification Systems. First International Conference on Security in Pervasive Computing (SPC) 2003

    Google Scholar 

  41. Weis S.A., Sarma S.E., Rivest R.L., Engels D.W. (2003) Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Proceedings of First International Conference on Security in Pervasive Computing (SPC 2003)

    Google Scholar 

  42. Yoo S. (2005) Mobile RFID Activities in Korea. Contribution Paper of the APT Standardization Program

    Google Scholar 

  43. Yutaka Y., Nakao K. (2002) A Study of Privacy Information Handling on Sensor Information Network. Technical Report of IEICE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Park, N., Won, D. (2008). Dynamic Privacy Protection for Mobile RFID Service. In: Kitsos, P., Zhang, Y. (eds) RFID Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-76481-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-76481-8_10

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-76480-1

  • Online ISBN: 978-0-387-76481-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics