TAILIEUCHUNG - Development and Implementation of RFID Technology_2

The book generously covers a wide range of aspects and issues related to RFID systems, namely the design of RFID antennas, RFID readers and the variety of tags (. UHF tags for sensing applications, surface acoustic wave RFID tags, smart RFID tags), complex RFID systems, security and privacy issues in RFID applications, as well as the selection of encryption algorithms. | 16 Privacy Enhancing Techniques on RFID systems1 Masataka Suzuki1 and Kazukuni Kobara2 1Bank of Japan 2National Institute of Advanced Industrial Science and Technology Japan 1. Introduction An RFID system is a tracking and tracing system and is useful for the management of various items and animals in a supply chain animal husbandry and so on. According to a Japanese investigation firm the number of RFID tags in Japan will increase rapidly from 51 million in 2007 to billion in 2012 Yano Research Institute 2008 . In RFID systems RFID tags which have unique IDs are attached to items and RFID readers confirm whether something is there and identify what it is by obtaining its ID. It is however pointed out that exploiting RFID systems could lead to some privacy issues. One issue is that someone may know what you have by getting the IDs of your items. Another one is that someone may know when and where you were by recording the time and the place at which the IDs were obtained. Many kinds of countermeasures against these issues have been proposed. Some of them have been implemented in RFID products. This chapter explains the privacy issues concerning RFID systems their countermeasures and finally compares them from the security point of view. 2. An RFID system and its privacy issues A basic RFID system At first we explain a basic RFID system in which an RFID tag hereafter called a Tag emits a plaintext of its ID to a Reader. The RFID system consists of the Tags the Reader and a Server. The Server assigns a unique ID to each Tag preliminarily Fig. 1-1 . This task may be done by manufacturers when shipping. The Server records the IDs and their corresponding information to its database Fig. 1-2 . In the phase of reading the ID of the Tag the Reader sends an ID-query to a Tag Fig. 1-3 and receives the ID as a response from the Tag Fig. 14 . The Reader forwards the ID to the Server Fig. 1-5 and the Server looks up its corresponding information in the database Fig. 1-6

TÀI LIỆU MỚI ĐĂNG
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.