A Study on RFID Privacy Mechanism using Mobile Phone 순순순순순순 순순순순 순순순 [email protected] 2006.05.24( 순 )
A Study on RFID Privacy Mechanism
using Mobile Phone
순천향대학교 전산학과강수영
2006.05.24( 수 )
2
A Study on RFID Privacy Mechanismusing Mobile PhoneContents
1. Abstract
2. Introduction
3. Mobile RFID
4. Proposed Protocol
5. Conclusion
6. Q & A
3
A Study on RFID Privacy Mechanismusing Mobile Phone1. Abstract
• Hiding RFID tag identifier (ID) using
handheld device like a cellular phone
• Use a cryptographic algorithm for
modification and restoring of RFID tag ID,
and for one original tag ID, there are
several different temporary tag ID,
periodically
4
A Study on RFID Privacy Mechanismusing Mobile Phone2. Introduction
• RFID
– Radio Frequency IDentification
– Emerged in order to replace a barcode
– Has many different advantages
– Enable a more various type of application service in ad
dition to simple identification
5
A Study on RFID Privacy Mechanismusing Mobile Phone2. Introduction
• RFID Advantages
CorrectData
Process
CorrectData
Process
AllEnvironment
Useable
AllEnvironment
UseableSame timeIdentification
Same timeIdentification
MovingIdentification
MovingIdentification
MemorySpace
MemorySpace
Non-contact
Non-contact
ObstaclePenetration
ObstaclePenetration
Read/WritePossible
Read/WritePossibleRFIDRFID
6
A Study on RFID Privacy Mechanismusing Mobile Phone2. Introduction
• RFID Applications
Circulation Manufacture
Financial
Public ETC.
Airport Distribution
Restaurant
SCM Warehousemanagement
Processcontrol
Electronic Card Electroniccommercial
Credit Card
Library Traffic expenses
Tree andFlower
ParkingPlace
Pet management
Patientmanagement
RobberyPrevention
7
A Study on RFID Privacy Mechanismusing Mobile Phone2. Introduction
• RFID Elements– Tag : Identifier store and provide
– Reader : Tag information read/write
– Database : Information store
Tags Antenna Reader Host Computer
Chip
8
A Study on RFID Privacy Mechanismusing Mobile Phone3. Mobile RFID
• Provide the description of the network
architecture for mobile RFID service and
present on/off shopping process using
mobile RFID system
• Provide privacy protection procedure
including protection of location tracking
and unauthorized selection of information
9
A Study on RFID Privacy Mechanismusing Mobile Phone3. Mobile RFID
• Mobile RFID
– Mobile Radio Frequency IDentification
– Concept and framework that provide end users with a
new various services with cellular phone built-in RFID t
ag chip and/or reader chip, over telecommunication n
etwork
10
A Study on RFID Privacy Mechanismusing Mobile Phone3. Mobile RFID
• Mobile RFID Elements– Tag : The EPC is a globally unique serial number that identifies a
n item in the supply chain
– Cellular Phone with RFID Reader : Cellular phone built-in a RFID reader chip or with a external RFID reader device
– Mobile RFID Application Server : Provides end users with a new various services like shopping
– ODS(Object Directory Service) Server : Provides the location of server containing product information related to RFID Tag by using DNS Technology
11
A Study on RFID Privacy Mechanismusing Mobile Phone3. Mobile RFID
• Mobile RFID Service Network Architecture
Payment ServerApplication Server
Local ODS Server National ODS Server
12
A Study on RFID Privacy Mechanismusing Mobile Phone3. Mobile RFID
• Shopping Procedure Using Mobile RFID
Payment ServerApplication ServerLocal ODS Server
1. Inventory (Tag ID)
2. ODS Query (Tag ID)
3. Information Query (URL)
4. Payment Process (Tag ID)
5. Access Right
13
A Study on RFID Privacy Mechanismusing Mobile Phone4. Proposed Protocol
• Procedure of hiding Original Tag ID
2. Unlock (Tag ID0)
1. Inventory (Tag ID)
Write (Tag IDE)
Lock (Tag IDE)
3. Inventory (Tag IDE)
Create New Tag IDE
Create New Tag IDE
Restore Tag ID0
4. ODS Query (Tag ID0)
5. Information Query (URL)
6. Unlock (Old Tag ID0)
Write (New Tag IDE)
Lock (New Tag IDE)
Application ServerLocal ODS Server
14
A Study on RFID Privacy Mechanismusing Mobile Phone5. Conclusion
• Intended to solve the following privacy problems
– Selecting the information of the goods by querying into
information server or application server by tag ID
– Inferring the information of the goods based on the tag
code hierarchy
– Tracking the location of the RFID tag built-in goods or
the owner of the goods
15
A Study on RFID Privacy Mechanismusing Mobile Phone5. Conclusion
• Find the following effect
– Can prevent an attacker from inferring the information
of the goods based on the tag code hierarchy
– Can prevent an attacker from gathering the information
of the goods related with RFID tag
– Can prevent tracking the location of the RFID tag built-in
goods or the owner of the goods
16
A Study on RFID Privacy Mechanismusing Mobile Phone6. Q & A