Security and User Privacy for Mobile-RFID Applications in Public Zone
نویسندگان
چکیده
To make RFID technology assist people in their daily lives, a new technology called “Mobile-RFID” (mRFID) is being considered. The mRFID technology incorporates RFID-reader functionality into portable handheld devices. In a public zone (e.g., street, shopping mall) we can use our mobile phone as an mRFID-reader to scan tagged merchandize and quickly download information about that merchandize. In this paper we emphasize that, with the ubiquitous presence of mRFID-readers all around us, in the form of mobile phones, we also need to consider some special security and privacy threats. We propose a security framework, which addresses issues such as: identifying cloned fake tags attached to counterfeit products, consumer authorization, secure and anonymous communication with only genuine information-servers that provide information about a particular tagged item, blocking malicious mRIFD-readers from snooping on the tagged items in our possession, and finally, a simple and secure mRFID payment scheme.
منابع مشابه
Mobile RFID Applications and Security Challenges
With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers, mobile phones provide an user-friendly approach to quickly and efficiently scan, access and view information about RFID tagged items. As RFID tags, mobile phones can quickly identify themselves in order to communicate with other tagged devices, which pr...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملA Forward Secured Authentication Protocol for Mobile Rfid Systems
The integration of RFID technology and mobile smart device stimulates the daily increasing popularity of mobile RFID-based applications, which makes its way to become a new hot zone for research and development. Current RFID authentication schemes are not viable to use in mobile RFID environment. The authentication schemes result in computing load to the low cost tag and provide insufficient pr...
متن کاملTraceability improvements of a new RFID protocol based on EPC C1 G2
Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi_Phan privacy model, we s...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کامل