Đang chuẩn bị liên kết để tải về tài liệu:
Development and Implementation of RFID Technology_2

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

The book generously covers a wide range of aspects and issues related to RFID systems, namely the design of RFID antennas, RFID readers and the variety of tags (e.g. UHF tags for sensing applications, surface acoustic wave RFID tags, smart RFID tags), complex RFID systems, security and privacy issues in RFID applications, as well as the selection of encryption algorithms. | 16 Privacy Enhancing Techniques on RFID systems1 Masataka Suzuki1 and Kazukuni Kobara2 1Bank of Japan 2National Institute of Advanced Industrial Science and Technology Japan 1. Introduction An RFID system is a tracking and tracing system and is useful for the management of various items and animals in a supply chain animal husbandry and so on. According to a Japanese investigation firm the number of RFID tags in Japan will increase rapidly from 51 million in 2007 to 1.7 billion in 2012 Yano Research Institute 2008 . In RFID systems RFID tags which have unique IDs are attached to items and RFID readers confirm whether something is there and identify what it is by obtaining its ID. It is however pointed out that exploiting RFID systems could lead to some privacy issues. One issue is that someone may know what you have by getting the IDs of your items. Another one is that someone may know when and where you were by recording the time and the place at which the IDs were obtained. Many kinds of countermeasures against these issues have been proposed. Some of them have been implemented in RFID products. This chapter explains the privacy issues concerning RFID systems their countermeasures and finally compares them from the security point of view. 2. An RFID system and its privacy issues 2.1 A basic RFID system At first we explain a basic RFID system in which an RFID tag hereafter called a Tag emits a plaintext of its ID to a Reader. The RFID system consists of the Tags the Reader and a Server. The Server assigns a unique ID to each Tag preliminarily Fig. 1-1 . This task may be done by manufacturers when shipping. The Server records the IDs and their corresponding information to its database Fig. 1-2 . In the phase of reading the ID of the Tag the Reader sends an ID-query to a Tag Fig. 1-3 and receives the ID as a response from the Tag Fig. 14 . The Reader forwards the ID to the Server Fig. 1-5 and the Server looks up its corresponding information in the database Fig. 1-6