Reference Hub1
Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network

Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network

Qiang Yan, Yingjiu Li, Robert H. Deng
Copyright: © 2013 |Pages: 23
ISBN13: 9781466636859|ISBN10: 1466636858|EISBN13: 9781466636866
DOI: 10.4018/978-1-4666-3685-9.ch010
Cite Chapter Cite Chapter

MLA

Yan, Qiang, et al. "Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network." Advanced Security and Privacy for RFID Technologies, edited by Ali Miri, IGI Global, 2013, pp. 153-175. https://doi.org/10.4018/978-1-4666-3685-9.ch010

APA

Yan, Q., Li, Y., & Deng, R. H. (2013). Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network. In A. Miri (Ed.), Advanced Security and Privacy for RFID Technologies (pp. 153-175). IGI Global. https://doi.org/10.4018/978-1-4666-3685-9.ch010

Chicago

Yan, Qiang, Yingjiu Li, and Robert H. Deng. "Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network." In Advanced Security and Privacy for RFID Technologies, edited by Ali Miri, 153-175. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3685-9.ch010

Export Reference

Mendeley
Favorite

Abstract

As RFID-enabled technology is becoming pervasive in enterprise systems and human life, it triggers significant concerns over the malware that can infect, damage, and even destroy RFID-enabled network systems. RFID malware can spread malicious codes or data quickly to a large number of RFID systems via RFID read and write, which are pervasive operations on RFID tags that are transported from one RFID system to another. To address this concern, this chapter uses RFID-enabled supply chain management systems in the EPCglobal network as a case study to demonstrate the important issues in RFID malware protection. This case study shows that although there are fundamental difficulties in preventing RFID malware from entering the systems, the behaviors of RFID malware resemble traditional malware after it enters the systems. Based on this characteristic, the security threats of RFID malware can be effectively controlled.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.