Deakin University

File(s) under permanent embargo

Critical analysis and comparative study of security for networked RFID systems

conference contribution
posted on 2013-01-01, 00:00 authored by Biplob Ray, Morshed ChowdhuryMorshed Chowdhury, Jemal AbawajyJemal Abawajy
The Radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. RFID technology is one of the most promising technologies in the field of ubiquitous computing which is revolutionizing the supply chain. It has already been applied by many major retail chains such as Target, Wal-Mart, etc. The networked RFID system such as supply chain has very unique and special business needs which lead to special sets of RFID security requirements and security models. However, very little work has been done to analyze RFID security parameters in relation to networked RFID systems business needs. This paper presents a critical analysis of the networked application's security requirements in relation to their business needs. It then presents a comparative study of existing literature and the ability of various models to protect the security of the supply chain in a RFID deployment.



Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Conference (14th : 2013 : Honolulu, Hawaii)


197 - 202


IEEE Computer Society Conference Publishing Services


Honolulu, Hawaii

Place of publication

Piscataway, N. J

Start date


End date






Publication classification

E1 Full written paper - refereed

Title of proceedings

SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin