Privacy and Security Requirements for RFID Applications

This paper surveys recent technical researches on the problems of privacy and security for various applications in radio frequency identification (RFID). Most RFID system try to design a high level security, but not all of the RFID applications need it. The cost will increase if the privacy and security simultaneously improve, thus, how to balance the two issues are important. This paper provides an insight into the privacy and security requirements for RFID applications by the industrial processes. We will discuss and compare privacy and security in various cases. The results of our surveys are helpful for security engineers, who are responsible for the design and development in RFID.

[1]  Iris A. Junglas,et al.  RFID as a Disruptive Innovation , 2008, J. Theor. Appl. Electron. Commer. Res..

[2]  Fan-Yun Pai,et al.  Evaluating the business value of RFID: Evidence from five case studies , 2008 .

[3]  Juan E. Tapiador,et al.  Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard , 2009, Comput. Commun..

[4]  Tony Yu-Ju Tu,et al.  Identifying RFID-embedded objects in pervasive healthcare applications , 2009, Decis. Support Syst..

[5]  Anming Zhang,et al.  Evaluating competitiveness of air cargo express services , 2009 .

[6]  Henry C. W. Lau,et al.  A RFID case-based logistics resource management system for managing order-picking operations in warehouses , 2009, Expert Syst. Appl..

[7]  John Ayoade,et al.  Roadmap to solving security and privacy concerns in RFID systems , 2007, Comput. Law Secur. Rev..

[8]  Joan García-Haro,et al.  Tracking of Returnable Packaging and Transport Units with active RFID in the grocery supply chain , 2009, Comput. Ind..

[9]  Gerhard P. Hancke,et al.  Transport ticketing security and fraud controls , 2009, Inf. Secur. Tech. Rep..

[10]  Xiao-dan Zhang,et al.  The review of RFID applications in global postal and courier services , 2006 .

[11]  Andrew S. Tanenbaum,et al.  RFID malware: Design principles and examples , 2006, Pervasive Mob. Comput..

[12]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[13]  Sung-Ho Kim,et al.  IPAP: Improved privacy and authentication protocol for passive RFID tags , 2010, 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content.

[14]  J. Landt,et al.  The history of RFID , 2005, IEEE Potentials.

[15]  Soo-Young Kang,et al.  A study on secure RFID mutual authentication scheme in pervasive computing environment , 2008, Comput. Commun..

[16]  Bart Jacobs,et al.  Crossing Borders: Security and Privacy Issues of the European e-Passport , 2006, IWSEC.

[17]  May Tajima Strategic value of RFID in supply chain management , 2007 .

[18]  Yu-Cheng Lin,et al.  Dynamic mobile RFID-based supply chain control and management system in construction , 2007, Adv. Eng. Informatics.

[19]  T. C. Edwin Cheng,et al.  Mobile commerce integrated with RFID technology in a container depot , 2007, Decis. Support Syst..

[20]  Alex X. Liu,et al.  PAP: A privacy and authentication protocol for passive RFID tags , 2009, Comput. Commun..

[21]  Brian King,et al.  Security Requirements for RFID Computing Systems , 2008, Int. J. Netw. Secur..

[22]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[23]  Matthew Stibbe Flight paths to security , 2005 .

[24]  Hsiao-Cheng Yu,et al.  Challenges to Global RFID Adoption , 2006 .

[25]  Yang Xiao,et al.  Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..

[26]  Ronald E. Rice,et al.  Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology , 2009, Int. J. Medical Informatics.

[27]  Monideepa Tarafdar,et al.  Classification of RFID adoption: An expected benefits approach , 2009, Inf. Manag..

[28]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[29]  Hung-Min Sun,et al.  Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems , 2008, 2009 Joint Conferences on Pervasive Computing (JCPC).

[30]  Tianjie Cao,et al.  Cryptanalysis of Two RFID Authentication Protocols , 2009, Int. J. Netw. Secur..