期刊文献+

Security and privacy threats in RFID traceability network 被引量:1

Security and privacy threats in RFID traceability network
下载PDF
导出
摘要 To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. Using this model, a secure communication protocol that can be used for anti-counterfeiting, automatic identification and privacy preservation is then developed. In order to manage the number of parties, data records of items, and complicated transitions of access permissions in an item-level traceability context, a well-designed access control protocol is proposed to parties that can prove the physical possession of an item;meanwhile, to address the privacy issues during data sharing in an RFID network, a vision of database systems that take responsibility for the privacy of the data they manage is also presented. To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. ...
出处 《Journal of Southeast University(English Edition)》 EI CAS 2008年第S1期132-135,共4页 东南大学学报(英文版)
基金 Program for New Century Excellent Talents in University of Fujian Province (No.X04139)
关键词 traceability network radio frequency identification (RFID) security protocol privacy protection strategy traceability network radio frequency identification (RFID) security protocol privacy protection strategy
  • 相关文献

参考文献10

  • 1Niederman Fred,,Mathieu Richard G,Morley Roger, et al.Examining RFID applications in supply chain management[].Communications of the ACM.2007
  • 2King Brian,Zhang Xiaolan.Securing the pharmaceutical supply chain using RFID[].Int Conf Multimedia and Ubiqui- tous Engineering.2007
  • 3Garfinkel S,Juels A,Pappu R.RFID privacy: an overview of problem and proposed solution[].IEEE Security and Privacy.2005
  • 4Li Yingjiu,Ding Xuhua.Protecting RFID communications in supply chains[].Proc ACM Symposium on InformAtion Com- puter and Communication Security.2007
  • 5Agrawal Rakesh,Cheung Alvin,Kailing Karin, et al.Towards traceability across sovereign, distributed RFID database[].Procth Int Database Engineering & Applications Symposium.2006
  • 6Beier Steve,Grandison Tyrone,Kailing Karin, et al.Discovery services-enabling RFID traceability in EPC global networks[].Procth Int Conf Management of Data.2006
  • 7Ilic Alexander,Michahelles Florian,Fleisch Elgar.The dual ownership model: using organizational relationships for access control in safety supply chains[].IEEE International Symposium on Ubisafe Computing.2007
  • 8Juels A.RFID security and privacy: a research survey[].IEEE Journal on Selected Area in Communication.2006
  • 9LeFevre K,Agrawal R,Ercegovac V, et al.Limiting disclosure in Hippo-cratic database[].Proc ofth International Con- ference on Very Large Data Bases.2004
  • 10Cho Kideok,Pack Sangheon,Kwon Taekyoung, et al.SRMS: SIP-based RFID management system[].Proc of IEEE In- ternational Conference on Pervasive Services.2007

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部