Security techniques based on EPC Gen2 tag for secure mobile RFID network services

Park Namje, Kwak Jin, Seung-Joo Kim, Won Dongho, Kim Howon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

RFID (Radio Frequency Identification) technology will be a ubiquitous reality in daily life in the near future. The R&D groups in global now have paid attention to integrate RFID with mobile phone devices as well as to associate with the existing mobile telecommunication network. Such a converged technology and services would lead to make new markets and research challenges. However, privacy threats on RFID tags embedded into products has become stumbling block. Therefore, this paper propose a new security technique for mobile RFID service, which can be support to secure RFID service and uses the privacy protection in mobile RFID network services.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages924-934
Number of pages11
Volume4251 LNAI - I
Publication statusPublished - 2006 Nov 13
Externally publishedYes
Event10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2006 - Bournemouth, United Kingdom
Duration: 2006 Oct 92006 Oct 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4251 LNAI - I
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2006
CountryUnited Kingdom
CityBournemouth
Period06/10/906/10/11

Fingerprint

Radio Frequency Identification Device
Radio Frequency Identification
Radio frequency identification (RFID)
Privacy
Technology
Computer Communication Networks
Privacy Protection
Cell Phones
Telecommunication Network
Mobile Networks
Mobile Phone
Marketing
Mobile phones
Telecommunication networks
erucylphosphocholine
Integrate
Equipment and Supplies

ASJC Scopus subject areas

  • Biochemistry, Genetics and Molecular Biology(all)
  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Namje, P., Jin, K., Kim, S-J., Dongho, W., & Howon, K. (2006). Security techniques based on EPC Gen2 tag for secure mobile RFID network services. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4251 LNAI - I, pp. 924-934). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4251 LNAI - I).

Security techniques based on EPC Gen2 tag for secure mobile RFID network services. / Namje, Park; Jin, Kwak; Kim, Seung-Joo; Dongho, Won; Howon, Kim.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4251 LNAI - I 2006. p. 924-934 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4251 LNAI - I).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Namje, P, Jin, K, Kim, S-J, Dongho, W & Howon, K 2006, Security techniques based on EPC Gen2 tag for secure mobile RFID network services. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4251 LNAI - I, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4251 LNAI - I, pp. 924-934, 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2006, Bournemouth, United Kingdom, 06/10/9.
Namje P, Jin K, Kim S-J, Dongho W, Howon K. Security techniques based on EPC Gen2 tag for secure mobile RFID network services. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4251 LNAI - I. 2006. p. 924-934. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Namje, Park ; Jin, Kwak ; Kim, Seung-Joo ; Dongho, Won ; Howon, Kim. / Security techniques based on EPC Gen2 tag for secure mobile RFID network services. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4251 LNAI - I 2006. pp. 924-934 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{cdab588162e741c3af7178c28e348123,
title = "Security techniques based on EPC Gen2 tag for secure mobile RFID network services",
abstract = "RFID (Radio Frequency Identification) technology will be a ubiquitous reality in daily life in the near future. The R&D groups in global now have paid attention to integrate RFID with mobile phone devices as well as to associate with the existing mobile telecommunication network. Such a converged technology and services would lead to make new markets and research challenges. However, privacy threats on RFID tags embedded into products has become stumbling block. Therefore, this paper propose a new security technique for mobile RFID service, which can be support to secure RFID service and uses the privacy protection in mobile RFID network services.",
author = "Park Namje and Kwak Jin and Seung-Joo Kim and Won Dongho and Kim Howon",
year = "2006",
month = "11",
day = "13",
language = "English",
isbn = "3540465359",
volume = "4251 LNAI - I",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "924--934",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Security techniques based on EPC Gen2 tag for secure mobile RFID network services

AU - Namje, Park

AU - Jin, Kwak

AU - Kim, Seung-Joo

AU - Dongho, Won

AU - Howon, Kim

PY - 2006/11/13

Y1 - 2006/11/13

N2 - RFID (Radio Frequency Identification) technology will be a ubiquitous reality in daily life in the near future. The R&D groups in global now have paid attention to integrate RFID with mobile phone devices as well as to associate with the existing mobile telecommunication network. Such a converged technology and services would lead to make new markets and research challenges. However, privacy threats on RFID tags embedded into products has become stumbling block. Therefore, this paper propose a new security technique for mobile RFID service, which can be support to secure RFID service and uses the privacy protection in mobile RFID network services.

AB - RFID (Radio Frequency Identification) technology will be a ubiquitous reality in daily life in the near future. The R&D groups in global now have paid attention to integrate RFID with mobile phone devices as well as to associate with the existing mobile telecommunication network. Such a converged technology and services would lead to make new markets and research challenges. However, privacy threats on RFID tags embedded into products has become stumbling block. Therefore, this paper propose a new security technique for mobile RFID service, which can be support to secure RFID service and uses the privacy protection in mobile RFID network services.

UR - http://www.scopus.com/inward/record.url?scp=33750686250&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33750686250&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33750686250

SN - 3540465359

SN - 9783540465355

VL - 4251 LNAI - I

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 924

EP - 934

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -