Abstract
Radio Frequency Identification (RFID) systems are increasingly becoming accepted for many EPC Network applications. However, RFID systems have some privacy problems. In this paper, a system for missing child location tracking in the EPC Network applications, is proposed. The proposed system improves security and privacy compared to existing applications, while also keeping in line with traditional procedures, commonly accepted by most industrial applications. The proposed MCLT (Missing Child Location Tracking) system can protect users’ privacy while providing location tracking of the RFID tag.
Chapter PDF
Similar content being viewed by others
References
Brock, D.L.: The electronic product code (EPC): A naming scheme for objects. Technical Report MIT-AUTOID-WH-002, MIT Auto ID Center (2001), Available from, http://www.autoidcenter.org
Brock, D.L.: EPC Tag Data Specification. Technical Report MIT-AUTOID-WH-025, MIT Auto ID Center (2003), Available from, http://www.autoidcenter.org
Cachin, C.: On-Line Secret Sharing. In: Boyd, C. (ed.) Cryptography and Coding 1995. LNCS, vol. 1025, pp. 190–198. Springer, Heidelberg (1995)
Chen, L., Gollmann, D., Mitchell, C.J., Wild, P.: Secret sharing with Reusable Polynomial. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 183–193. Springer, Heidelberg (1997)
Engels, D.: The Reader Collision Problem. Technical Report. MIT-AUTOID-WH-007, MIT Auto ID Center (2001), Available from, http://www.autoidcenter.org
Engels, D.: EPC-256 : The 256-bit Electronic Product Code Representation. Technical Report MIT-AUTOID-WH-010, MIT Auto ID Center (2003), Available from, http://www.autoidcenter.org
EPCglobal. The EPCglobal Network: Overview of Design, Benefits, and Security (September 24, 2004), Available from, http://www.epcglobalinc.org
Ewatt, D.M., Hayes, M.: Gillette razors get new edge: RFID tags. Information Week (January 13, 2003), Available from, http://www.informationweek.com
Fedlman, P.: A Practical scheme for Non-interactive Verifiable secret sharing. In: The 28th Annual Symposium on the Foundation of Computer Science, pp. 427–437 (1987)
Finkenzeller, K.: RFID Handbook. John Wiley and Sons, Chichester (1999)
Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2005. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103–111 (2003)
Kim, S., Park, S., Won, D.: Proxy Signatures, Revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)
Knospe, H., Pobl, H.: RFID Security. Information Security Technical Report 9(4), 39–50 (2004)
Kwak, J., Rhee, K., Oh, S., Kim, S., Won, D.: RFID System wuth Fairness within the frmaework of Security and Privacy. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, Springer, Heidelberg (2005)
Leong, K.S., Ng, M.L.: A Simple EPC Enterprise Model. Auto-ID Labs Workshop Zurich (2004), Available from, http://www.m-lab.ch
Ohkubo, M., Suzuki, K., Kinoshita, S.: A Cryptographic Approach to ”Privacy-Friendly” tag. In: RFID Privacy Workshop (November 2003), http://www.rfidprivacy.org/
Pedersen, T.P.: A Threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)
Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)
Sarma, S.E.: Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center (2001), Available from, http://www.autoidcenter.org
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT (2002)
Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency identification systems. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)
Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency-identification security risks and challenges. CryptoBytes 6(1) (2003)
Scharfeld, T.: An Analysis of the Fundamental Constraints on Low Cost Passive Radio-Frequency Identification System Design. MS Thesis, Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge, MA 02139 (2001)
Security technology: Where’s the smart money? The Economist, pp. 69–70 (February 9, 2002)
Shamir, A.: How to share a secret. Communication of the ACM 21, 120–126 (1979)
Tompa, M., Woll, H.: How to share a secret with cheater. Journal of Cryptology 1, 133–138 (1988)
Weis, S.A.: Radio-frequency identification security and privacy. Master’s thesis, M.I.T. (May 2003)
Weis, S.A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) SPC 2004. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwak, J. et al. (2006). An RFID System Based MCLT System with Improved Privacy. In: Zhou, X., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol 4097. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11807964_59
Download citation
DOI: https://doi.org/10.1007/11807964_59
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36850-2
Online ISBN: 978-3-540-36851-9
eBook Packages: Computer ScienceComputer Science (R0)