logistics processes [12], in an adequate way and of
complete transparency [11]. At the end of each
description, solutions of treating the jeopardizing
points are emphasized. Working with RFID
protocols involves more stages: (a) stages of
installation: the system’s database and the RFID
transponders are established and initialized;
(b) stages of communication: the system’s database
and the RFID transponders communicate and
interact; (c) stages of searching: the RFID system
searches in its database the identifiers of
transponders.
Some threatening parts against the RFID
technology can be brought into mind: relay attack
and impersonation, leakage of information or
anticipation of traceability. The privacy issues
cannot be handled by using only the classical
theoretical methods, but rather by including the
privacy issues within communication methods as an
entire, starting with the physical level up to the
application level. Radiofrequency identification
brings into analysis, as any other technologies in
progress, some security issues. In many
applications, the high cost of RFID technology will
be balanced out by reaching the best solutions and
results.
References:
[1] A. Juels, Minimalist cryptography for low-cost
RFID tags, International Conference on
Security in communication Networks – SCN
2004, Volume 3352 of Lecture Notes in
Computer Science, 2004, pp. 149-164.
[2] C. Hurjui, A. Graur, C.O. Turcu, Monitoring
the Shopping Activities from the Supermarkets
based on the Intelligent Basket by using the
RFID Technology, The Journal “Electronics
and Electrical Engineering”, Lithuania, No. 3
(83), 2008, pp. 7-10.
[3] X. Huang , Scrutinizing Behavior of a Dynamic
Framed Slotted Anti-collision Algorithm for
RFID Systems, 7th WSEAS Int. Conference on
Applied Computer & Applied Computational
Science (ACACOS '08), Hangzhou, China,
April 6-8, 2008, pp. 112- 115.
[4] S. Srinivasan, Akshai Aggarwal, Anup Kumar,
RFID Security and Privacy Concerns, Proceedings of the 4th WSEAS International
Conference on Information Security,
Communications and Computers, Tenerife,
Spain, December 16-18, 2005, pp.69-74.
[5] S. Weis, S. Sarma, R. Rivest, D. Engels,
Security and privacy aspects of low-cost radio
frequency identification systems, International
Conference on Security in Pervasive
Computing – SPC 2003, pp. 454-469.
[6] S. Garfinkel, B. Rosenberg, RFID:
Applications, Security and Privacy, Addison
Wesley Professional, 2005.
[7] A. Juels and S. Weis, Authenticating pervasive
devices with human protocols, Proceedings of
Advances in Cryptology, CRYPTO’05,
California, USA, August 2005, pp. 293-308.
[8] I. Ray, In. Ray, An optimistic fair exchange e-
commerce protocol with automated dispute
resolution, Electronic Commerce and Web
Technologies, EC-Web 2000, London, United
Kingdom, 2000, pp. 84-93.
[9] Z. Hu, Z. Jian, S. Ping Z. Xiaoshuan, M.
Weisong, Modeling Method of Traceability
System based on Information Flow in Meat
Food Supply Chain, WSEAS Transactions on
Information Science and Applications, Issue 7,
Volume 6, July 2009, pp. 1094-1103.
[10] N. Amin, P. Weng Lin, Anti-collision Protocol
Development for Passive RFID Tags,
Proceedings of the 7th WSEAS International
Conference on Applied Informatics and
Communications, Athens, Greece, August 24-
26, 2007, pp. 393-397.
[11] C. Hurjui, C. Turcu, A. Graur, Management
system of the products on warranty based on
RFID technologies, Proceedings of the 11th
International Conference on Optimization of
Electrical and Electronic Equipment – Optim,
2008, pp. 231-236.
[12] R-S. Chen, C-C. Chen, K.C. Yeh, Y-C. Chen,
and C-W Kuo, Using RFID Technology in
Food Produce Traceability, WSEAS
Transactions on Information Science and
Applications, Volume 5, Issue 11, 2008, pp.
1551-1560.
[13] P. Golle, M. Jakobsson, A. Juels, P. Syverson.
Universal re-encryption for mixnets, The
Cryptographers‘Track at RSA Conference-CT-
RSA, California, USA, 2004, pp. 163-178.
[14] D. Molnar, A. Soppera, D. Wagner, A scalable,
delegatable, pseudonym protocol enabling
ownership transfer of RFID tags, Handout of
the Encrypt Workshop on RFID and
Lightweight Crypto, July 2005.
[15] A. Juels, R. Rivest, M. Szydlo, The blocker tag:
Selective blocking of RFID tags for consumer
privacy, Proc. Computer and Communications
Security – CCS’03, Washington, DC, USA,
2003, pp. 103-111.
[16] K. Finkenzeller, RFID Handbook, Wiley,
England, second edition, 2003.
WSEAS TRANSACTIONS on COMMUNICATIONS Cristina Hurjui, Stefan Holban, Adrian Graur
ISSN: 1109-2742 417 Issue 7, Volume 9, July 2010
Top Related