Abstract
Supply-chain RFID systems introduce significant privacy issues to consumers, making it necessary to encrypt communications. Because the resources available on tags are very small, it is generally assumed that only symmetric-key cryptography can be used in such systems. Unfortunately, symmetric-key cryptography imposes negative trust issues between the various stake-holders, and risks compromising the security of the whole system if even a single tag is reverse engineered. This work presents a working prototype implementation of a secure RFID system which uses public-key cryptography to simplify deployment, reduce trust issues between the supply-chain owner and tag manufacturer, and protect user privacy. The authors' prototype system consists of a UHF tag running custom firmware, a standard off-the-shelf reader and custom point-of-sale terminal software. No modifications were made to the reader or the air interface, proving that high-security EPC tags and standard EPC tags can coexist and share the same infrastructure.
Original language | English |
---|---|
Article number | 6818503 |
Pages (from-to) | 52-60 |
Number of pages | 9 |
Journal | IEEE Pervasive Computing |
Volume | 13 |
Issue number | 2 |
DOIs | |
State | Published - 1 Jan 2014 |
Externally published | Yes |
Keywords
- RFID
- pervasive computing
- security
- supply chain
ASJC Scopus subject areas
- Software
- Computer Science Applications
- Computational Theory and Mathematics