Abstract
The use of RFID tags (radio-frequency identification tags) in banknotes presents a main challenge that may discourage their usage: how to avoid a possible attacker to count the amount of tags. Such a drawback is faced in this paper by designing an appropriate Medium Access Control (MAC) for this scenario. A MAC is the set of mechanisms and protocols that allows devices to share the communication channel. In a RFID system, a MAC protocol makes it possible for several tags to communicate within a common environment with the RFID reader. In this paper, we present a new MAC protocol that is suitable for ensuring security in the use of RFID-enabled banknotes. It also guarantees privacy and fits scalability requirements when the number of tags is increasing.
This work was supported by the Generalitat de Catalunya with a Grant FIC, and the projects of the Spanish MCyT TIN2006-15662-C02-02 and MTM2007-66842-C02-02.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)
Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The Evolution of RFID Security. IEEE Pervasive Computing 5(1), 62–69 (2006)
Choi, E.Y., Lee, S.M., Lee, D.H.: Self-updating: Strong Privacy Protection Protocol for RFID-Tagged Banknotes. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 1171–1180. Springer, Heidelberg (2007)
Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)
Kinoshita, S., Hoshino, F., Komuro, T., Fujimura, A., Ohkubo, M.: Nonidentifiable Anonymous-ID Scheme for RFID Privacy Protection. Joho Shori Gakkai Shinpojiumu Ronbunshu CSS (15), 497–502 (2003) (in Japanese)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 454–469. Springer, Heidelberg (2004)
Castelluccia, C., Avoine, G.: Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 289–299. Springer, Heidelberg (2006)
Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Atluri, V. (ed.) Conference on Computer and Communications Security – ACM CCS, Washington, DC, USA, October 2003, pp. 103–111. ACM Press, New York (2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to “Privacy-Friendly” Tags. In: RFID Privacy Workshop (2003)
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: International Workshop on Pervasive Computing and Communication Security – PerSec, pp. 110–114. IEEE Computer Society Press, Los Alamitos (2005)
Martínez, S., Valls, M., Roig, C., Miret, J.M., Giné, F.: A Secure Elliptic Curve-Based RFID Protocol. Journal of Computer Science and Technology 24(2), 309–318 (2009)
Floerkemeier, C., Wille, M.: Comparison of Transmission Schemes for Framed ALOHA based RFID Protocols. In: International Symposium on Applications and the Internet Workshops – SAINTW, pp. 92–97. IEEE Computer Society Press, Los Alamitos (2006)
Khandelwal, G., Yener, A., Lee, K., Serbetli, S.: ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems. In: IEEE International Conference on Communications – ICC, vol. 9, pp. 4028–4033 (2007)
Waldrop, J., Engels, D.W., Sarma, S.E.: Colorwave: A MAC for RFID Reader Networks. Wireless Communications and Networking 3, 1701–1704 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Martínez, S., Roig, C., Valls, M. (2010). Securing the Use of RFID-Enabled Banknotes. In: Sion, R., et al. Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6054. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14992-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-14992-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14991-7
Online ISBN: 978-3-642-14992-4
eBook Packages: Computer ScienceComputer Science (R0)