File(s) under permanent embargo
Critical analysis and comparative study of security for networked RFID systems
conference contribution
posted on 2013-01-01, 00:00 authored by Biplob Ray, Morshed ChowdhuryMorshed Chowdhury, Jemal AbawajyJemal AbawajyThe Radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. RFID technology is one of the most promising technologies in the field of ubiquitous computing which is revolutionizing the supply chain. It has already been applied by many major retail chains such as Target, Wal-Mart, etc. The networked RFID system such as supply chain has very unique and special business needs which lead to special sets of RFID security requirements and security models. However, very little work has been done to analyze RFID security parameters in relation to networked RFID systems business needs. This paper presents a critical analysis of the networked application's security requirements in relation to their business needs. It then presents a comparative study of existing literature and the ability of various models to protect the security of the supply chain in a RFID deployment.
History
Event
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Conference (14th : 2013 : Honolulu, Hawaii)Pagination
197 - 202Publisher
IEEE Computer Society Conference Publishing ServicesLocation
Honolulu, HawaiiPlace of publication
Piscataway, N. JPublisher DOI
Start date
2013-07-01End date
2013-07-03ISBN-13
9780769550053Language
engPublication classification
E1 Full written paper - refereedTitle of proceedings
SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed ComputinUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC