Reference Hub1
A Security Framework for Networked RFID

A Security Framework for Networked RFID

Harinda Sahadeva Fernando, Jemal H. Abawajy
ISBN13: 9781466601611|ISBN10: 1466601612|EISBN13: 9781466601628
DOI: 10.4018/978-1-4666-0161-1.ch004
Cite Chapter Cite Chapter

MLA

Fernando, Harinda Sahadeva, and Jemal H. Abawajy. "A Security Framework for Networked RFID." Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications, edited by Jemal H. Abawajy, et al., IGI Global, 2012, pp. 85-114. https://doi.org/10.4018/978-1-4666-0161-1.ch004

APA

Fernando, H. S. & Abawajy, J. H. (2012). A Security Framework for Networked RFID. In J. Abawajy, M. Pathan, M. Rahman, A. Pathan, & M. Deris (Eds.), Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications (pp. 85-114). IGI Global. https://doi.org/10.4018/978-1-4666-0161-1.ch004

Chicago

Fernando, Harinda Sahadeva, and Jemal H. Abawajy. "A Security Framework for Networked RFID." In Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications, edited by Jemal H. Abawajy, et al., 85-114. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0161-1.ch004

Export Reference

Mendeley
Favorite

Abstract

In the last decade RFID technology has become a major contender for managing large scale logistics operations and generating and distributing the massive amount of data involved in such operations. One of the main obstacles to the widespread deployment and adoption of RFID systems is the security issues inherent in them. This is compounded by a noticeable lack of literature on how to identify the vulnerabilities of a RFID system and then effectively identify and develop counter measures to combat the threats posed by those vulnerabilities. In this chapter, the authors develop a conceptual framework for analysing the threats, attacks, and security requirements pertaining to networked RFID systems. The vulnerabilities of, and the threats to, the system are identified using the threat model. The security framework itself consists of two main concepts: (1) the attack model, which identifies and classifies the possible attacks, and (2) the system model, which identifies the security requirements. The framework gives readers a method with which to analyse the threats any given system faces. Those threats can then be used to identify the attacks possible on that system and get a better understanding of those attacks. It also allows the reader to easily identify all the security requirements of that system and identify how those requirements can be met.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.