A Study on RFID Privacy Mechanism using Mobile Phone

This paper is about hiding RFID tag identifier (ID) using handheld device like a cellular phone. By modifying the tag ID of objects periodically or manually using cellular phone built-in a RFID reader chip or with a external RFID reader device, we can prevent other people from gathering the information related with objects querying information server (like an EPC IS) with a tag ID or deriving the information from tag ID-s code structure or tracking the location of the objects and the owner of the objects. In this paper, we use a cryptographic algorithm for modification and restoring of RFID tag ID, and for one original tag ID, there are several different temporary tag ID, periodically.


Keywords:


References:
[1] EPCglobal Web site. www.epcglobalinc.org, 2005.
[2] EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF
RFID Protocol for Communications at 860 MHz - 960 MHz Version
1.0.9
ttp://www.epcglobalinc.org/stan-dards_technology/EPCglobalClass-1Ge
neration-2UHFRF-IDProtocolV109.pdf
[3] http://www.ods.or.kr/english/overviewOds.jsp
[4] Nokia unveils RFID phone reader. RFID Journal, 17 March 2004.
Available at http://www.r-fidjournal.com/article/view/834/1/13.
[5] Ari Juels. Minimalist cryptography for low-cost RFID tags. In C. Blundo
and S. Cimato, editors, Security in Communication Networks (SCN 04),
pages 149-164. Springer-Verlag, 2004. LNCS no. 3352.
[6] David Molnar and David Wagner. Privacy and Security in Library RFID :
Issues, Practices, and Architectures. In B. Pfitzmann and P. McDaniel,
editors, Computer and Communica-tions Security, pages 210 - 219.
ACM, 2004.
[7] Ari Juels and Ravikanth Pappu. Squealing euros: Privacy protection in
RFID enabled bank-notes. In Rebecca N. Wright, editor, Financial
Cryptography - FC-03, volume 2742 of Lecture Notes in Computer
Science, pages 103-121, Le Gosier, Guadeloupe, French West In-dies,
January 2003. IFCA, Springer-Verlag.
[8] P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal
re-encryption for mixnets. In T.Okamoto, editor, CT-RSA -04.
Springer-Verlag, 2004.
[9] RFID Journal Frequently Asked Questions,
http://www.rfidjournal.com/faq.
[10] Mobile RFID Forum, http://www.mrf.or.kr.
[11] Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W.
Engels. Security and Privacy Aspects of Low-Cost Radio Frequency
Identification Systems. In Security in Pervasive Computing, volume 2802
of Lecture Notes in Computer Science, pages 201-212, 2004.
[12] The 5-Cent Challenge. RFID Journal, 30 August 2004. Available at
http://www.rfidjou-rnal.com/article/articleview/1100/1/2/.
[13] Test Set for RFID-Enabled Phones. RFID Journal, 20 September 2004.
Available at http:// www.rfidjourn-al.com/article/articleview/1125/1/20/.
[14] About the EPCglobal Network™. Available at
http://www.epcglobalinc.com/about/about _epc_network.html.
[15] IP4 Portable RFID Reader. Available at
http://www.intermec.com/eprise/main/Intermec/C-ontent/Products/Produ
cts_ShowDetail?Product=RFID2_IP4
[16] Mobile RFID Forum- Launched. IT Korea Journal March~April 2005,
page 61. Available at
http://www.ica.or.kr/lib/ITKorea_Eng(0503)/052%20industry%20news.
pdf
[17] RSA Laboratories. What is the RSA cryptosystem? Available at
http://www.rsasecurity.co-m/ rsalabs/node.asp?id=2214.
[18] Mauro Barni and France Bartolini. Data Hiding for Fighting Piracy. In
IEEE Signal Processing Magazine, March 2004, page 28 ~ 39.
[19] Stephan J. Engberg, Morten B. Harning, Christian Damsgaard Jensen.
Zero-knowledge Device Authentication: Privacy & Security Enhanced
RFID preserving Business Value and Consumer Convenience, In
Proceeding of PST 2004, page 89~100.