Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network

Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network

Qiang Yan, Yingjiu Li, Robert H. Deng
ISBN13: 9781466647077|ISBN10: 1466647078|EISBN13: 9781466647084
DOI: 10.4018/978-1-4666-4707-7.ch058
Cite Chapter Cite Chapter

MLA

Yan, Qiang, et al. "Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network." Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2014, pp. 1166-1188. https://doi.org/10.4018/978-1-4666-4707-7.ch058

APA

Yan, Q., Li, Y., & Deng, R. H. (2014). Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network. In I. Management Association (Ed.), Crisis Management: Concepts, Methodologies, Tools, and Applications (pp. 1166-1188). IGI Global. https://doi.org/10.4018/978-1-4666-4707-7.ch058

Chicago

Yan, Qiang, Yingjiu Li, and Robert H. Deng. "Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network." In Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1166-1188. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4707-7.ch058

Export Reference

Mendeley
Favorite

Abstract

As RFID-enabled technology is becoming pervasive in enterprise systems and human life, it triggers significant concerns over the malware that can infect, damage, and even destroy RFID-enabled network systems. RFID malware can spread malicious codes or data quickly to a large number of RFID systems via RFID read and write, which are pervasive operations on RFID tags that are transported from one RFID system to another. To address this concern, this chapter uses RFID-enabled supply chain management systems in the EPCglobal network as a case study to demonstrate the important issues in RFID malware protection. This case study shows that although there are fundamental difficulties in preventing RFID malware from entering the systems, the behaviors of RFID malware resemble traditional malware after it enters the systems. Based on this characteristic, the security threats of RFID malware can be effectively controlled.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.