An Implementation Model of RFID Information Security and Privacy

Article Preview

Abstract:

The technology of Radio Frequency Identification System (RFID) was being applied to various trade promotions, and Tag is considered to be the next generation of Barcode. However, the RFID is via transmission of radio frequency manner, so hacker could obtain information through the analysis way of frequency signal. The personal privacy will be violated if used in the user's privacy information and transmission without any protective measures to protect. RFID data transmission and storage with hardware ways to achieve the security of information is the best way, but this had been in the problem of Tag costs and capacity. The study taking from the applications ways is to achieve RFID information security and privacy, and do the information securities between the low-cost Tag and the Reader. The study submitted an EPC specification and combined with XOR logical implementation model to achieve privacy by the way of discussion currently. We got the data after simulations to show that XOR computing to 8 bytes actual test, the required time is 17.29 Ticks in average, the spend time is rather short. Follow-up our simulations to the test data of DES encryption methods, an average time of 8,039.41 Ticks is required, the two time required considerable differences.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3330-3334

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Li, li-yan , "Identity in a dynamic base to protect low-cost passive radio frequency identification Tag subjectt to the user privacy", master's thesis, department of information engineer , National Chiao Tung University( 2005).

Google Scholar

[2] Ministry of Finance RFID office for promoting public applied in the area of electronic fortnightly RFID developments, Issue 5, 04-16-2006, http: //RFID. More. Org. tw/epaper 5/ver 05. c. HTML.

Google Scholar

[3] Ministry of Economic Affairs office, "Promoting innovation Australia again Auto-ID Lab Lightweight Permitive," published, 09-26-2006, http: //www. RFID. Org. tw/content. PHP? sn=195

Google Scholar

[4] Phillips, T.; Karygiannis, T.; Kuhn, R.,"Security standards for the RFID market", Security & Privacy, IEEE, Volume 3,  Issue 6(Nov.- Dec. 2005), pp.85-89

DOI: 10.1109/msp.2005.157

Google Scholar

[5] Garfinkel, S.L.; Juels, A.; Pappu, R., "RFID privacy: an overview of problems and proposed solutions",Security & Privacy, IEEE,Volume 3, Issue 3( May June 2005), pp.34-43

DOI: 10.1109/msp.2005.78

Google Scholar

[6] Radio Frequency Identification Technology in the Federal Government, May 2005, http://www.gao.gov/new.items/d05551.pdf

Google Scholar

[7] Developing NationalPolicies on the Deployment of Radio Frequency Identification (RFID) Technology, Feb. 17 2006, http://www.ieeeusa.org/policy/positions/rfid.html

Google Scholar

[8] Heiko Knospe; Hartmut Poble, "RFID Security " ,Information Security Technical Report,Vol. 9 No. 4( 2004), pp.39-49

Google Scholar