Implementation of terminal middleware platform for mobile RFID computing

The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal, comprises RFID tags, which are embedded or attached to objects, an RFID reader and Information Services (ISs) server. The RFID reader can be stationary or mobile; the latter enables more applications. This paper describes the core components required for realising a mobile RFID application, such as mobile RFID reader and the platform and network architectures. Although several types of mobile RFID readers are available, we propose and analyse the characteristics of customised mobile RFID technology, which affords several advantages related to security, network architecture, and operation scenario etc.

[1]  Simson L. Garfinkel,et al.  RFID: Applications, Security, and Privacy , 2005 .

[2]  Flavio D. Garcia,et al.  Modeling Privacy for Off-Line RFID Systems , 2010, CARDIS.

[3]  Kwangjo Kim,et al.  Mobile RFID Applications and Security Challenges , 2006, ICISC.

[4]  Jeeyeon Kim,et al.  Privacy threats and issues in mobile RFID , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[5]  Younghwa An,et al.  RFID System for User's Privacy Protection , 2005, 2005 Asia-Pacific Conference on Communications.

[6]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[7]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[8]  Ruay-Shiung Chang,et al.  A Mobile Personalized RFID System , 2009, 2009 International Conference on Network-Based Information Systems.

[9]  K. Wouters,et al.  Practical Experiences with NFC Security on mobile Phones , 2009 .

[10]  Dongho Won,et al.  WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment , 2006, APWeb Workshops.

[11]  Gildas Avoine,et al.  RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks , 2009, CANS.

[12]  Florian Michahelles,et al.  Securing RFID Systems by Detecting Tag Cloning , 2009, Pervasive.

[13]  Dongho Won,et al.  Security Analysis and Implementation Leveraging Globally Networked RFIDs , 2006, PWC.

[14]  Myunghee Son,et al.  Design and implementation of mobile RFID technology in the CDMA networks , 2006, 2006 8th International Conference Advanced Communication Technology.

[15]  Hyoung Jun Kim,et al.  RFID code structure and tag data structure for mobile RFID services in Korea , 2006, 2006 8th International Conference Advanced Communication Technology.

[16]  Philippe Oechslin,et al.  RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.

[17]  Dongho Won,et al.  RFID System with Fairness Within the Framework of Security and Privacy , 2005, ESAS.

[18]  Katherine J. Strandburg,et al.  Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .

[19]  Howon Kim,et al.  The design of dynamic authorization model for user centric service in mobile environment , 2006, 2006 8th International Conference Advanced Communication Technology.