DOI QR코드

DOI QR Code

Security Framework for RFID-based Applications in Smart Home Environment

  • Konidala, Divyan M. (Dept. of Information and Communications Engineering, Korea Advanced Institute of Science and Technology (KAIST)) ;
  • Kim, Dae-Young (Department of Computer Science, KAIST) ;
  • Yeun, Chan-Yeob (Computer Engineering (Sharjah Campus), Khalifa University of Science, Technology & Research (KUSTAR)) ;
  • Lee, Byoung-Cheon (Dept. of Information Security, Joongbu University)
  • Received : 2010.08.06
  • Accepted : 2010.08.31
  • Published : 2011.03.31

Abstract

The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its display screen. Realizing such an application is not as straight forward as it seems to be, especially in securely deploying such RFID-based applications in a smart home environment. Therefore this paper describes some of the RFID-based applications that are applicable to smart home environments. We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators), and RFID-based applications would securely interact among one another. At the moment our approach is just a conceptual idea, but it sheds light on very important security issues related to RFID-based applications that are beneficial for consumers.

Keywords

References

  1. EPCglobal Inc., http://www.EPCglobalinc.org
  2. EPCglobal Ratified Specification, “The EPCglobal Architecture Framework,” 2009. http://www.epcglobalinc.org/standards/
  3. EPCglobal Ratified Standard, “EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz - 960MHz Version 1.2.0,” 2008. http://www.epcglobalinc.org/standards/
  4. Impinj RFID Technology Series Whitepaper, “UHF Gen 2 for Item-Level Tagging,” REV 1.0 02-06, February 2006, http://www.impinj.com/files/MR_GP_ED_00003_ILT.pdf
  5. Internet Engineering Task Force (IETF), Network Working Group, and E. Rescorla, “HTTP Over TLS,” RFC2818, http://tools.ietf.org/html/rfc2818, 2000.
  6. ISO/IEC 18092, “Near Field Communication Interface and Protocol (NFCIP-1),” http://www.iso.org/iso/catalogue_detail.htm?csnumber=38578
  7. Juels, A. (2005), RFID Security and Privacy: A Research Survey, RSA Laboratories.
  8. Klaus, F., RFID Handbook - Fundamentals and Applications in Contactless Smart Cards and Identification,, 2nd Edition, John Wiley & Sons, 2003, ISBN-13: 978-0470844021.
  9. VeriSign, The EPCglobal Network: Enhancing the Supply Chain, White Paper 2005, http://www.verisign.com/stellent/groups/public/documents/white_paper/002109.pdf

Cited by

  1. Improving Smart Home Security: Integrating Logical Sensing Into Smart Home vol.17, pp.13, 2017, https://doi.org/10.1109/JSEN.2017.2705045
  2. A Survey of RFID Deployment and Security Issues vol.7, pp.4, 2011, https://doi.org/10.3745/JIPS.2011.7.4.561
  3. UFLE: a user-friendly location-free encryption system for mobile users 2012, https://doi.org/10.1002/sec.615
  4. Reliability and security of arbiter-based physical unclonable function circuits vol.26, pp.6, 2013, https://doi.org/10.1002/dac.2411
  5. Building a Smooth Medical Service for Operating Room Using RFID Technologies vol.2014, 2014, https://doi.org/10.1155/2014/984721
  6. An object-based middleware supporting efficient interoperability on a smart home network vol.63, pp.1, 2013, https://doi.org/10.1007/s11042-011-0926-7
  7. A novel user authentication scheme with anonymity for wireless communications 2012, https://doi.org/10.1002/sec.601
  8. User Localization in Complex Environments by Multimodal Combination of GPS, WiFi, RFID, and Pedometer Technologies vol.2014, 2014, https://doi.org/10.1155/2014/814538
  9. Multipoint-to-point communications for SHE surveillance with QoS and QoE management vol.25, pp.7, 2012, https://doi.org/10.1016/j.engappai.2012.03.019
  10. An analysis of performance factors on Esper-based stream big data processing in a virtualized environment vol.27, pp.6, 2014, https://doi.org/10.1002/dac.2734
  11. A Study of Smart Power Control Algorithm Using RF Communication in Smart Home Environment vol.9, pp.12, 2013, https://doi.org/10.1155/2013/690902
  12. Escrowable identity-based authenticated key agreement protocol with strong security vol.65, pp.9, 2013, https://doi.org/10.1016/j.camwa.2012.01.041