scispace - formally typeset
Search or ask a question
Author

Shingo Kinoshita

Other affiliations: JEOL Ltd.
Bio: Shingo Kinoshita is an academic researcher from Nippon Telegraph and Telephone. The author has contributed to research in topics: Identifier & Communications system. The author has an hindex of 10, co-authored 40 publications receiving 1151 citations. Previous affiliations of Shingo Kinoshita include JEOL Ltd..

Papers
More filters
01 Jan 2003
TL;DR: This paper discusses and clarifies the requirements and restrictions of RFID systems, and suggests the use of the previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism.
Abstract: Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags are affixed to everyday items, they may be used to support various useful services. However, widespread deployment of RFID tags may create new threats to user privacy, due to the powerful tracking capability of the tags. There are several important technical points when constructing an RFID scheme. Particularly important is ensuring forward security, i.e., data transmitted today will still be secure even if secret tag information is revealed by tampering in the future. Low cost implementation is another key RFID requirement. This paper discusses and clarifies the requirements and restrictions of RFID systems. This paper also examines the features and issues pertinent to several existing RFID schemes. Finally, this paper suggests the use of our previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism.

682 citations

Journal ArticleDOI
TL;DR: This publication contains reprint articles for which IEEE does not hold copyright and is not available on IEEE Xplore for these articles.
Abstract: Cheap tags and technology simple and secure enough to ensure personal data privacy are required before retailers implement and consumers trust and confidently use them on a mass scale.

245 citations

Patent
27 Sep 2004
TL;DR: In this article, a tag device reads, in response to a call from a reader device, a secret value from secret value memory in a second arithmetic apart, and produces tag output information in which a second function (F2) for misleading a relationship between the elements of a domain and a mapping thereof has been caused to act on the secret value.
Abstract: According to a first invention, a tag device reads, in response to a call from a reader device, a secret value from a secret value memory in a second arithmetic apart, and produces tag output information in which a second function (F2) for misleading a relationship between the elements of a domain and a mapping thereof has been caused to act on the secret value. This tag output information is sent to an output part and then outputted therefrom to a backend device. Thereafter, in a first arithmetic part, the elements of at least a part of the secret values in a secret value memory are read therefrom, and a first function (F1), which is difficult to obtain therefrom an inverse mapping, is caused to act on those elements. A result of this arithmetic is used to overwrite and update the secret values in the secret value memory. According to a second invention, in an updating device external to the tag device, concealed ID information stored in the tag device is updated on a predetermined occasion into new concealed ID information that is difficult to grasp the relationship therebetween.

48 citations

01 Jan 2005
TL;DR: This paper clarifies the active tag privacy problem and proposes a method for protecting personal privacy regarding the active RFID tags, and introduces an active tag prototype that implements the proposed method and evaluated its effectiveness.
Abstract: In the coming future ubiquitous society, Radio Frequency Identification (RFID) tags will be affixed to every product and person. This technology is anticipated to be a key technology that will be utilized by various ubiquitous services where these tags will be used to identify things and people and will automatically take advantage of contextual information such as location. On the other hand, a problem is arising where the excellent tracking ability of RFID is abused and personal privacy is being violated. This paper clarifies the active tag privacy problem and proposes a method for protecting personal privacy regarding the active RFID tags. In the proposed method, reencryption technologies are used to make the tag ID variable. Since variable IDs generated from one ID are cannot be linked to one another by third parties, RFID privacy problems based on a fixed ID can be abated. Furthermore, we introduce an active tag prototype that implements the proposed method and evaluated its effectiveness.

40 citations

01 Jan 2004
TL;DR: In this paper, the authors discuss the issues in Japanese publication business, possible solutions using Auto-ID technologies, and an experimental prototype system are described, and the scope of the study includes distribution channels that span publishers, distributors, book stores, and readers, as well as the treatment of issues like privacy after a book has reached its consumer.
Abstract: In recent years, because ofthe decrease in costs and increase in promotion activities by standard groups such as Auto-ID Center, RFID has been gathering greater interests from industries such as apparel, publication, appliances, and general household goods. Furthermore, RFID is considered to be more than just a tool for efficient logistics and commerce; it is one of the infrastructure technologies for ubiquitous computing society. In particular, the publication industry has been proactive in adopting RFID in the areas such as logistics, anti-theft, marketing, and customer services. With the equipment vendors beginning to merge into this activity, it is hoped that the possibilities of RFID and its successful application be realized in the near future. DNP, Sun, and NTT are cooperatively studying potential applications of Auto-ID technologies to Japanese publication business. The scope of the study includes distribution channels that span publishers, distributors, book stores, and readers, as well as the treatment of issues like privacy after a book has reached its consumer. This paper summarizes the activities and the findings thus far. The issues in Japanese publication business, possible solutions using Auto-ID technologies, and an experimental prototype system are described.

23 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues as a whole.
Abstract: Internet of Things (IoT) is playing a more and more important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, there come all kinds of challenges. This paper focuses on the security problems among all other challenges. As IoT is built on the basis of the Internet, security problems of the Internet will also show up in IoT. And as IoT contains three layers: perception layer, transportation layer and application layer, this paper will analyze the security problems of each layer separately and try to find new problems and solutions. This paper also analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues of IoT as a whole and tries to find solutions to them. In the end, this paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT.

1,060 citations

Journal ArticleDOI
TL;DR: The paper presents a brief overview of smart cities, followed by the features and characteristics, generic architecture, composition, and real-world implementations ofSmart cities, and some challenges and opportunities identified through extensive literature survey on smart cities.

925 citations

Proceedings ArticleDOI
25 Oct 2004
TL;DR: Privacy issues related to Radio Frequency Identification in libraries are exposed, current deployments are described, and a simple scheme is given that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations.
Abstract: We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID; the technology promises to relieve repetitive strain injury, speed patron self-checkout, and make possible comprehensive inventory. Unlike supply-chain RFID, library RFID requires item-level tagging, thereby raising immediate patron privacy issues. Current conventional wisdom suggests that privacy risks are negligible unless an adversary has access to library databases. We show this is not the case. In addition, we identify private authentication as a key technical issue: how can a reader and tag that share a secret efficiently authenticate each other without revealing their identities to an adversary? Previous solutions to this problem require reader work linear in the number of tags. We give a general scheme for building private authentication with work logarithmic in the number of tags, given a scheme with linear work as a sub protocol. This scheme may be of independent interest beyond RFID applications. We also give a simple scheme that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations.

751 citations

Journal ArticleDOI
TL;DR: A literature review of 85 academic journal papers that were published on the subject between 1995 and 2005 is presented in this article, where the authors organize these studies into four main categories: technological issues, applications, policy and security issues, and other issues.

713 citations

Journal ArticleDOI
TL;DR: A new ultralightweight RFID authentication protocol is proposed that provides strong authentication and strong integrity protection of its transmission and of updated data and can resist all the possible attacks.
Abstract: As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight RFID authentication protocols to resist all possible attacks and threats. However, all of the previous ultralightweight authentication schemes are vulnerable to various attacks. In this paper, we propose a new ultralightweight RFID authentication protocol that provides strong authentication and strong integrity protection of its transmission and of updated data. The protocol requires only simple bit-wise operations on the tag and can resist all the possible attacks. These features make it very attractive to low-cost RFIDs and very low-cost RFIDs.

505 citations