Skip to main content

A Study on Secure SDP of RFID Using Bluetooth Communication

  • Conference paper
Computational Science and Its Applications – ICCSA 2005 (ICCSA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3481))

Included in the following conference series:

  • 1649 Accesses

Abstract

Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called “ad hoc network” and the smart-tag technology required by a ubiquitous environment. We will describe how to apply smart-tag-related Radio Frequency Identification(RFID) research for Bluetooth, a local-area wireless-communication technology. In order to implement RFID technology for the ubiquitous-computing infrastructure, a number of important technology factors and structures should be considered. These include the realization of low-priced tags and the provision of technical service for the tag’s security. For the passive RFID tags, the functions of each RFID tag and maintenance service should be considered to guarantee the price efficiency. As for the active RF tags’ support of local-area wireless communication, one of the main issues is enhancing the level of security. This paper will present secured RF-tag service for the RF and Bluetooth modes for local-area wireless communication. A method of applying the generated service to the EPC code developed by MIT will also be suggested.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy- FriendlyTag. In: RFID Privacy Workshop@MIT (November 2003)

    Google Scholar 

  2. Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-Frequency Identification: Secure Risks and Challenges. RSA Laboratories Cryptobytes 6(1), 2–9 (2003)

    Google Scholar 

  3. Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency identification systems. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Sarma, S.E.: Towards the five-cent Tag, Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center (2001), Available from, http://www.autoidcenter.org

  5. Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. Masters Thesis. MIT, Cambridge (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seo, DH., Lee, IY., Park, HU. (2005). A Study on Secure SDP of RFID Using Bluetooth Communication. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_13

Download citation

  • DOI: https://doi.org/10.1007/11424826_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25861-2

  • Online ISBN: 978-3-540-32044-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics