Skip to Main Content
RFID systems can identify an object by reading ID inside a RFID tag using radio frequency. However, because a RFID tag replies its unique ID to the request of any reader through wireless communication, it is vulnerable to attacks on security or privacy through wiretapping or an illegal reader's request. In particular, because recommendation services of RFID systems do not assign mobility to all nodes in the network, there happens a large overhead for secure communication when the mobility of nodes are considered. This paper proposes that reflect secure and efficient recommendation service of RFID system and integrated management of information extracted from RFID tags regardless of application. Authenticated key management, in this context, suitable for wireless communication even when the nodes are mobile and new nodes are inserted frequently.
Date of Conference: 20-22 Dec. 2009