Critical analysis and comparative study of security for networked RFID systems

Ray, Biplob R., Chowdhury, Morshed and Abawajy, Jemal 2013, Critical analysis and comparative study of security for networked RFID systems, in SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin, IEEE Computer Society Conference Publishing Services, Piscataway, N. J, pp. 197-202.

Attached Files
Name Description MIMEType Size Downloads

Title Critical analysis and comparative study of security for networked RFID systems
Author(s) Ray, Biplob R.
Chowdhury, Morshed
Abawajy, Jemal
Conference name Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Conference (14th : 2013 : Honolulu, Hawaii)
Conference location Honolulu, Hawaii
Conference dates 1-3 Jul. 2013
Title of proceedings SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin
Editor(s) [Unknown]
Publication date 2013
Conference series Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing Conference
Start page 197
End page 202
Total pages 6
Publisher IEEE Computer Society Conference Publishing Services
Place of publication Piscataway, N. J
Keyword(s) RFID
comparative study
supply chairn
Summary The Radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. RFID technology is one of the most promising technologies in the field of ubiquitous computing which is revolutionizing the supply chain. It has already been applied by many major retail chains such as Target, Wal-Mart, etc. The networked RFID system such as supply chain has very unique and special business needs which lead to special sets of RFID security requirements and security models. However, very little work has been done to analyze RFID security parameters in relation to networked RFID systems business needs. This paper presents a critical analysis of the networked application's security requirements in relation to their business needs. It then presents a comparative study of existing literature and the ability of various models to protect the security of the supply chain in a RFID deployment.
ISBN 9780769550053
Language eng
Field of Research 080504 Ubiquitous Computing
Socio Economic Objective 810107 National Security
HERDC Research category E1 Full written paper - refereed
Persistent URL http://hdl.handle.net/10536/DRO/DU:30054502

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 22 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Mon, 22 Jul 2013, 11:21:48 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.