WIPI mobile platform with secure service for mobile RFID network environment

Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

135 Citations (Scopus)


Recently, RFID (Radio Frequency Identification) technology is practically applied to a number of logistics processes as well as asset management, and RFID is also expected to be permeated in our daily life with the name of 'Ubiquitous Computing' or 'Ubiquitous Network' within the near future. The R&D groups in global now have paid attention to integrate RFID with mobile devices as well as to associate with the existing mobile telecommunication network. Such a converged technology and services would lead to make new markets and research challenges. However, the privacy violation on tagged products has become stumbling block. We propose light-weight security mechanism which is constructed by mobile RFID security mechanism based on WIPI (Wireless Internet Platform for Interoperability). WIPI-based light-weight mobile RFID security platform can be applicable to various mobile RFID services that required secure business applications in mobile environment.

Original languageEnglish
Title of host publicationAdvanced Web and Network Technologies, and Applications - APWeb 2006 International Workshops
Subtitle of host publicationXRA, IWSN, MEGA, and ICSE, Proceedings
Number of pages8
Publication statusPublished - 2006
Externally publishedYes
EventAPWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE - Harbin, China
Duration: 2006 Jan 162006 Jan 18

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3842 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


OtherAPWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'WIPI mobile platform with secure service for mobile RFID network environment'. Together they form a unique fingerprint.

Cite this