Secure RFID Personal Data Management Using Privacy Reference Profile
نویسندگان
چکیده
We propose a secure framework for mobile-phone based RFID service using personal privacy policy based access control for personalized ultrahigh frequency (UHF) tags employing the Electronic Product Code (EPC). The framework, called mobile RPS, has dynamic capabilities that extend upon extent trust-building service mechanisms for RFID systems. This new technology aims to provide absolute confidentiality with only basic tags.
منابع مشابه
Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network
Recently, mobile RFID (Radio Frequency Identification) services such as in smart poster or supply chain are rapidly growing up as a newly generating industry. Here, mobile RFID service is defined as a special type of mobile service using RFID tag packaging object and RFID reader attached mobile RFID terminal. This paper is to provide an approach for ensuring RFID net-work security based on secu...
متن کاملSecure Architecure for the Integration of RFID and Sensors in Personal Networks
The secure integration of RFID technology into the personal network paradigm, as a context-aware technology which complements body sensor networks, would provide notable benefits to applications and potential services of the personal network (PN). RFID security as an independent technology is reaching an adequate maturity level thanks to research in recent years; however, its integration into t...
متن کاملRfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Cloud based RFID authentication is becoming a large area of interest among researchers and engineers these days. However, there is not much attention given to the RFID authentication concern. Most of the work done on this issue till now has its focus on RFID functionality without considering security and privacy. Classical RFID authentication schemes do not meet the security and privacy require...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کامل