A security framework for networked RFID

Fernando, Harinda Sahadeva and Abawajy, Jemal 2012, A security framework for networked RFID, in Internet and distributed computing advancements : theoretical frameworks and practical applications, IGI Global, Hershey, Pa., pp.85-114.

Attached Files
Name Description MIMEType Size Downloads

Title A security framework for networked RFID
Author(s) Fernando, Harinda Sahadeva
Abawajy, Jemal
Title of book Internet and distributed computing advancements : theoretical frameworks and practical applications
Editor(s) Abawajy, Jemal H.
Pathan, Mukaddim
Rahman, Mustafizur
Pathan, Al-Sakib Khan
Deris, Mustafa Mat
Publication date 2012
Chapter number 4
Total chapters 11
Start page 85
End page 114
Total pages 30
Publisher IGI Global
Place of Publication Hershey, Pa.
Keyword(s) RFID technology
RFID systems
attack models
security
RFID
Summary In the last decade RFID technology has become a major contender for managing large scale logistics operations and generating and distributing the massive amount of data involved in such operations. One of the main obstacles to the widespread deployment and adoption of RFID systems is the security issues inherent in them. This is compounded by a noticeable lack of literature on how to identify the vulnerabilities of a RFID system and then effectively identify and develop counter measures to combat the threats posed by those vulnerabilities. In this chapter, the authors develop a conceptual framework for analysing the threats, attacks, and security requirements pertaining to networked RFID systems. The vulnerabilities of, and the threats to, the system are identified using the threat model. The security framework itself consists of two main concepts: (1) the attack model, which identifies and classifies the possible attacks, and (2) the system model, which identifies the security requirements. The framework gives readers a method with which to analyse the threats any given system faces. Those threats can then be used to identify the attacks possible on that system and get a better understanding of those attacks. It also allows the reader to easily identify all the security requirements of that system and identify how those requirements can be met.
ISBN 1466601620
9781466601628
Language eng
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890103 Mobile Data Networks and Services
HERDC Research category B1 Book chapter
Copyright notice ©2012, IGI Global
Persistent URL http://hdl.handle.net/10536/DRO/DU:30043144

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 93 Abstract Views, 19 File Downloads  -  Detailed Statistics
Created: Tue, 13 Mar 2012, 09:47:42 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.