Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment

@inproceedings{Park2010SecuritySF,
  title={Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment},
  author={Namje Park},
  booktitle={ICICA},
  year={2010}
}
  • Namje Park
  • Published in ICICA 15 October 2010
  • Computer Science, Business
Mobile RFID environment means that mobile RFID devices like mobile (cellular) phone and PDA employing cellular network can be used at querying information of the consumer product related a tag. The mobile RFID devices should have mobile RFID readers which are made for them and are, in particular, compliant with EPC Class-1 Generation-2 UHF (860-960 MHz) standard. Ensuring the security of mobile RFID’s large-capacity database system by depending only on existing encryption schemes is unrealistic… 

Cell phone-based mobile RFID: models, mechanisms and its security

  • Namje Park
  • Computer Science, Business
    Int. J. Radio Freq. Identif. Technol. Appl.
  • 2012
This paper discusses the details of a mobile RFID system anatomy, followed by a discussion of the components that make up a typical mobile RFIDs system framework and the underlying sub-systems that make them work.

Secure UHF/HF Dual-Band RFID : Strategic Framework Approaches and Application Solutions

The proposed framework provides a means for securing the stability of mobile RFID services by suggesting personal policy based access control for personalized tags.

Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device

The proposed framework provides a means for safe use of mobile phone-based RFID services by providing security to personalized RFID tags by leveraging globally networked mobile RFID service.

Secure RFID Personal Data Management Using Privacy Reference Profile

We propose a secure framework for mobile-phone based RFID service using personal privacy policy based access control for personalized ultrahigh frequency (UHF) tags employing the Electronic Product

Implementation of Personalized Wellness Service

A secure framework for mobile based RFID services using personal policy-based access control for personalized ultra-high frequency (UHF) tags employing the Electronic Product Code (EPC) is proposed.

Design of Mobile NFC Extension Protocol for Various Ubiquitous Sensor Network Environments

The dual tag development with marketability and NDEF decoder development as well as additional technology development, standardization, and patents of related technologies are required to apply the linking method of two technologies.

Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student's Harmful Contents

In personalized RFID environments, if mobile terminals as RFID readers access harmful contents and read them, all related data such as accessing time or contents’ title should be analyzed afterward for checking whether they used for accessing harmful contents or not.

Mobile RFID/NFC Linkage Based on UHF/HF Dual Band's Integration in U-Sensor Network Era

The introduction of dual tag and the code system linkage suggested a linking method to maximally use the existing infrastructure and the requirement satisfaction and the future direction for the new standard design was suggested.

Implementation of Policy-Based Personalized Wellness Service in IoT Environment

A secure mobile RFID-based wellness service framework leveraging mobile networking is proposed that provides a means for safe use of mobile phone-based RFID services by providing security to personalized wellness service.

Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

The proposed mutual authentication and session-key distribution system for devices with only encryption modules can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.
...

References

SHOWING 1-10 OF 17 REFERENCES

Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network

This paper proposes an efficient phone-based middleware platform architecture which is constructed by mobile RFID security mechanism based on WIPI (Wireless Internet Platform for Interoperability).

WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment

A light-weight security mechanism which is constructed by mobile RFID security mechanism based on WIPI (Wireless Internet Platform for Interoperability) can be applicable to various mobile RFIDs services that required secure business applications in mobile environment.

Implementation of terminal middleware platform for mobile RFID computing

  • Namje Park
  • Computer Science, Business
    Int. J. Ad Hoc Ubiquitous Comput.
  • 2011
This paper proposed and analysed the characteristics of customised mobile RFID technology, which affords several advantages related to security, network architecture, and operation scenario etc, and described the core components required for realising a mobile RFIDs application.

RFID code structure and tag data structure for mobile RFID services in Korea

  • J. S. LeeHyoung-Jun Kim
  • Business, Computer Science
    2006 8th International Conference Advanced Communication Technology
  • 2006
The design of a code system for mobile RFID services is discussed and a tag data structure is defined that enables mobileRFID services to operate normally under an environment where other RFID systems configured with different code systems coexist; thus preventing conflicts.

Multilateral Approaches to the Mobile RFID Security Problem Using Web Service

The secure application portal service framework leveraging globally mobile RFIDs based on web service which complies with the Korea's mobile RFID forum standard is described.

Security Analysis and Implementation Leveraging Globally Networked RFIDs

The security analysis and implementation leveraging globally networked mobile RFIDs service which complies with the Korea's mobile RFID forum standard is described.

A network reference model for B2C RFID applications

An alternative network reference model can be suggested to the market and Korea's mobile network operators are adopting this proposed architecture for E2E-based communication model.

Open Location-Based Service Using Secure Middleware Infrastructure in Web Services

The security methods for open LBS are shown and it is shown the role of security service is very important in the LBS that store and manage the location information of mobile devices and support various application services using those location information.

Power-aware scheduling algoritms for wire-less networks

A set of scheduling algorithm that dynamically schedule the transmission channel to mobiles based on both traffic requests and battery power levels of mobiles is proposed and studied, demonstrating that the proposed power-aware scheduling techniques provide low-power mobiles with lower packet dropping probabilities and more efficient use of the mobile radio.