期刊文献+

物联网应用中有源RFID标签的EAL4安全要求 被引量:5

Assurance level 4 security requirements of active radio frequency identification tags in the Internet of Things
原文传递
导出
摘要 该文为物联网应用中安全要求较高的有源RFID标签类产品建立了一套满足评估保证级(EAL)4级的一组安全要求。此安全要求的建立,以通用评估准则(ISO15408)为依据,通过对有源标签保护的资产价值和潜在威胁的分析,为有源标签界定了合理的评估保证级别及相应的安全保证要求,并通过分析其在物联网应用中可能面临的潜在威胁,导出了有源标签需要满足的安全目的,进一步得出了需要满足的最小安全功能要求,并论证了它们之间的对应性。建立的安全要求框架可以作为指引研发者对有源标签进行全面安全性设计考量的重要参考,也可以为有源标签类产品的采购、测评提供依据。 A framework is given for evaluation assurance level 4(EAL4) security requirements for radio frequency identification(RFID) active tags in applications for the Internet of Things(IOT).The evaluation assurance level and the security assurance requirements are chosen based on ISO/IEC standard 15 408 and an analysis of the asset value and potential threat.Then,the potential threats are related to the active tags to set security objectives for the target to resist potential attacks.A minimal set of security function requirements is given to specify the functionality of active tags.Finally,the consistency between the Abstractions is analyzed to justify the rationale behind the framework.This work provides a reference for designers of security mechanisms for active tags and a basis for the evaluation and procurement of active tags.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第10期1453-1459,共7页 Journal of Tsinghua University(Science and Technology)
关键词 物联网 射频识别(RFID) 有源标签 通用评估准则 安全要求框架 the Internet of Things(IOT) radio frequency identification(RFID) active tags common criteria framework of security requirement
  • 相关文献

参考文献8

  • 1胡向东,魏琴芳,向敏.物联网安全[M].北京:科学出版社,2012.
  • 2Mitrokotsa A,Rieback M R,Tanenbaum A S.ClassifyingRFID attacks and defense[J].Information SystemsFrontiers,2010,12:491-505.
  • 3EPCTM-Radio-Frequency Identity Protocols Class-1Generation-2UHF RFID Protocol for Communications at 860MHz-960MHzV1.2.0[S].Lawrenceville,USA:EPCglobal Incorporation,2008.
  • 4Haselsteiner E,BreifuK.Security in near fieldcommunication(NFC)[Z/OL].(2012-4-25),http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf.
  • 5EPC globle Tag Class Definitions_1_0-whitepaper-20071101[S].Lawrenceville,USA:EPCglobal Incorporation,2007.
  • 6Farn K J,Lin S K,Lo C C.A study on e-Taiwan informationsystem,security classification and implementation[J].Computer Standards&Interface,2008,30(1-2):1-7.
  • 7Yu Y C.Should&how RFID system be evaluated against CCv3.1[C] //Proceedings of the 8th International CommonCriteria Conference.Rome,Italy:Common CriteriaRecognition Arrangement,2007.
  • 8Yu Y C,Hou T W.Utilize common criteria methodology forsecure ubiquitous healthcare environment[J].Journal ofMedical Systems,2012,36(3):1689-1696.

共引文献9

同被引文献13

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部