A Study on RFID Privacy Mechanism

1,003 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,003
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
26
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

A Study on RFID Privacy Mechanism

  1. 1. A Study on RFID Privacy Mechanism using Mobile Phone 순천향대학교 전산학과 강수영 [email_address] 2006.05.24( 수 )
  2. 2. Contents <ul><li>Abstract </li></ul><ul><li>Introduction </li></ul><ul><li>Mobile RFID </li></ul><ul><li>Proposed Protocol </li></ul><ul><li>Conclusion </li></ul><ul><li>Q & A </li></ul>
  3. 3. 1. Abstract <ul><li>Hiding RFID tag identifier (ID) using handheld device like a cellular phone </li></ul><ul><li>Use a cryptographic algorithm for modification and restoring of RFID tag ID, and for one original tag ID, there are several different temporary tag ID, periodically </li></ul>
  4. 4. 2. Introduction <ul><li>RFID </li></ul><ul><ul><li>R adio F requency ID entification </li></ul></ul><ul><ul><li>Emerged in order to replace a barcode </li></ul></ul><ul><ul><li>Has many different advantages </li></ul></ul><ul><ul><li>Enable a more various type of application service in addition to simple identification </li></ul></ul>
  5. 5. 2. Introduction <ul><li>RFID Advantages </li></ul>Correct Data Process All Environment Useable Same time Identification Moving Identification Memory Space Non- contact Obstacle Penetration Read/Write Possible RFID
  6. 6. 2. Introduction <ul><li>RFID Applications </li></ul>Circulation Manufacture Financial Public ETC. Airport Distribution Restaurant SCM Warehouse management Process control Electronic Card Electronic commercial Credit Card Library Traffic expenses Tree and Flower Parking Place Pet management Patient management Robbery Prevention
  7. 7. 2. Introduction <ul><li>RFID Elements </li></ul><ul><ul><li>Tag : Identifier store and provide </li></ul></ul><ul><ul><li>Reader : Tag information read/write </li></ul></ul><ul><ul><li>Database : Information store </li></ul></ul>Tags Antenna Reader Host Computer Chip
  8. 8. 3. Mobile RFID <ul><li>Provide the description of the network architecture for mobile RFID service and present on/off shopping process using mobile RFID system </li></ul><ul><li>Provide privacy protection procedure including protection of location tracking and unauthorized selection of information </li></ul>
  9. 9. 3. Mobile RFID <ul><li>Mobile RFID </li></ul><ul><ul><li>Mobile R adio F requency ID entification </li></ul></ul><ul><ul><li>Concept and framework that provide end users with a new various services with cellular phone built-in RFID tag chip and/or reader chip, over telecommunication network </li></ul></ul>
  10. 10. 3. Mobile RFID <ul><li>Mobile RFID Elements </li></ul><ul><ul><li>Tag : The EPC is a globally unique serial number that identifies an item in the supply chain </li></ul></ul><ul><ul><li>Cellular Phone with RFID Reader : Cellular phone built-in a RFID reader chip or with a external RFID reader device </li></ul></ul><ul><ul><li>Mobile RFID Application Server : Provides end users with a new various services like shopping </li></ul></ul><ul><ul><li>ODS(Object Directory Service) Server : Provides the location of server containing product information related to RFID Tag by using DNS Technology </li></ul></ul>
  11. 11. 3. Mobile RFID <ul><li>Mobile RFID Service Network Architecture </li></ul>
  12. 12. 3. Mobile RFID <ul><li>Shopping Procedure Using Mobile RFID </li></ul>
  13. 13. 4. Proposed Protocol <ul><li>Procedure of hiding Original Tag ID </li></ul>
  14. 14. 5. Conclusion <ul><li>Intended to solve the following privacy problems </li></ul><ul><ul><li>Selecting the information of the goods by querying into information server or application server by tag ID </li></ul></ul><ul><ul><li>Inferring the information of the goods based on the tag code hierarchy </li></ul></ul><ul><ul><li>Tracking the location of the RFID tag built-in goods or the owner of the goods </li></ul></ul>
  15. 15. 5. Conclusion <ul><li>Find the following effect </li></ul><ul><ul><li>Can prevent an attacker from inferring the information of the goods based on the tag code hierarchy </li></ul></ul><ul><ul><li>Can prevent an attacker from gathering the information of the goods related with RFID tag </li></ul></ul><ul><ul><li>Can prevent tracking the location of the RFID tag built-in goods or the owner of the goods </li></ul></ul>
  16. 16. 6. Q & A

×