16
A Study on RFID Privacy Mechanism using Mobile Phone 순순순순순순 순순순순 순순순 [email protected] 2006.05.24( 순 )

A Study on RFID Privacy Mechanism

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: A Study on RFID Privacy Mechanism

A Study on RFID Privacy Mechanism

using Mobile Phone

순천향대학교 전산학과강수영

[email protected]

2006.05.24( 수 )

Page 2: A Study on RFID Privacy Mechanism

2

A Study on RFID Privacy Mechanismusing Mobile PhoneContents

1. Abstract

2. Introduction

3. Mobile RFID

4. Proposed Protocol

5. Conclusion

6. Q & A

Page 3: A Study on RFID Privacy Mechanism

3

A Study on RFID Privacy Mechanismusing Mobile Phone1. Abstract

• Hiding RFID tag identifier (ID) using

handheld device like a cellular phone

• Use a cryptographic algorithm for

modification and restoring of RFID tag ID,

and for one original tag ID, there are

several different temporary tag ID,

periodically

Page 4: A Study on RFID Privacy Mechanism

4

A Study on RFID Privacy Mechanismusing Mobile Phone2. Introduction

• RFID

– Radio Frequency IDentification

– Emerged in order to replace a barcode

– Has many different advantages

– Enable a more various type of application service in ad

dition to simple identification

Page 5: A Study on RFID Privacy Mechanism

5

A Study on RFID Privacy Mechanismusing Mobile Phone2. Introduction

• RFID Advantages

CorrectData

Process

CorrectData

Process

AllEnvironment

Useable

AllEnvironment

UseableSame timeIdentification

Same timeIdentification

MovingIdentification

MovingIdentification

MemorySpace

MemorySpace

Non-contact

Non-contact

ObstaclePenetration

ObstaclePenetration

Read/WritePossible

Read/WritePossibleRFIDRFID

Page 6: A Study on RFID Privacy Mechanism

6

A Study on RFID Privacy Mechanismusing Mobile Phone2. Introduction

• RFID Applications

Circulation Manufacture

Financial

Public ETC.

Airport Distribution

Restaurant

SCM Warehousemanagement

Processcontrol

Electronic Card Electroniccommercial

Credit Card

Library Traffic expenses

Tree andFlower

ParkingPlace

Pet management

Patientmanagement

RobberyPrevention

Page 7: A Study on RFID Privacy Mechanism

7

A Study on RFID Privacy Mechanismusing Mobile Phone2. Introduction

• RFID Elements– Tag : Identifier store and provide

– Reader : Tag information read/write

– Database : Information store

Tags Antenna Reader Host Computer

Chip

Page 8: A Study on RFID Privacy Mechanism

8

A Study on RFID Privacy Mechanismusing Mobile Phone3. Mobile RFID

• Provide the description of the network

architecture for mobile RFID service and

present on/off shopping process using

mobile RFID system

• Provide privacy protection procedure

including protection of location tracking

and unauthorized selection of information

Page 9: A Study on RFID Privacy Mechanism

9

A Study on RFID Privacy Mechanismusing Mobile Phone3. Mobile RFID

• Mobile RFID

– Mobile Radio Frequency IDentification

– Concept and framework that provide end users with a

new various services with cellular phone built-in RFID t

ag chip and/or reader chip, over telecommunication n

etwork

Page 10: A Study on RFID Privacy Mechanism

10

A Study on RFID Privacy Mechanismusing Mobile Phone3. Mobile RFID

• Mobile RFID Elements– Tag : The EPC is a globally unique serial number that identifies a

n item in the supply chain

– Cellular Phone with RFID Reader : Cellular phone built-in a RFID reader chip or with a external RFID reader device

– Mobile RFID Application Server : Provides end users with a new various services like shopping

– ODS(Object Directory Service) Server : Provides the location of server containing product information related to RFID Tag by using DNS Technology

Page 11: A Study on RFID Privacy Mechanism

11

A Study on RFID Privacy Mechanismusing Mobile Phone3. Mobile RFID

• Mobile RFID Service Network Architecture

Payment ServerApplication Server

Local ODS Server National ODS Server

Page 12: A Study on RFID Privacy Mechanism

12

A Study on RFID Privacy Mechanismusing Mobile Phone3. Mobile RFID

• Shopping Procedure Using Mobile RFID

Payment ServerApplication ServerLocal ODS Server

1. Inventory (Tag ID)

2. ODS Query (Tag ID)

3. Information Query (URL)

4. Payment Process (Tag ID)

5. Access Right

Page 13: A Study on RFID Privacy Mechanism

13

A Study on RFID Privacy Mechanismusing Mobile Phone4. Proposed Protocol

• Procedure of hiding Original Tag ID

2. Unlock (Tag ID0)

1. Inventory (Tag ID)

Write (Tag IDE)

Lock (Tag IDE)

3. Inventory (Tag IDE)

Create New Tag IDE

Create New Tag IDE

Restore Tag ID0

4. ODS Query (Tag ID0)

5. Information Query (URL)

6. Unlock (Old Tag ID0)

Write (New Tag IDE)

Lock (New Tag IDE)

Application ServerLocal ODS Server

Page 14: A Study on RFID Privacy Mechanism

14

A Study on RFID Privacy Mechanismusing Mobile Phone5. Conclusion

• Intended to solve the following privacy problems

– Selecting the information of the goods by querying into

information server or application server by tag ID

– Inferring the information of the goods based on the tag

code hierarchy

– Tracking the location of the RFID tag built-in goods or

the owner of the goods

Page 15: A Study on RFID Privacy Mechanism

15

A Study on RFID Privacy Mechanismusing Mobile Phone5. Conclusion

• Find the following effect

– Can prevent an attacker from inferring the information

of the goods based on the tag code hierarchy

– Can prevent an attacker from gathering the information

of the goods related with RFID tag

– Can prevent tracking the location of the RFID tag built-in

goods or the owner of the goods

Page 16: A Study on RFID Privacy Mechanism

16

A Study on RFID Privacy Mechanismusing Mobile Phone6. Q & A