Security and Privacy Controls in RFID Systems: Applied to EPCglobal Networks by Wiem Tounsi, PDF

Security and Privacy Controls in RFID Systems: Applied to EPCglobal Networks

  • Title: Security and Privacy Controls in RFID Systems: Applied to EPCglobal Networks
  • Autor: Wiem Tounsi
  • Publisher (Publication Date): LAP LAMBERT Academic Publishing (November 29, 2014)
  • Language: English
  • ISBN-10: |
  • ISBN-13: |
  • File Format: EPUB, PDF

 
RFID technology was originally envisioned to automate data collection in a supply chain. Over the last years, substantial progress has been made to integrate this technology into context-aware applications. A promising scenario is the use of passive RFID tags to implement home healthcare systems. Indeed, using RFID technology in such critical domain has grown in importance with the need of assisting people (e.g., elderly individuals and patients) in their everyday life. The deployment of the passive RFID technology is becoming more important with the standardization process through the Electronic Product Code (EPC) Class 1 Generation 2 tag standard, known as Gen2. As in many other emerging technologies, if countermeasures against attacks are not handled properly at the lowest levels of the architecture, security risks and privacy violations happen. In this book, we focus on the use of passive RFID devices, specifically the Gen2 tags. We deal with data leakage as a privacy issue in two levels: the first concerns the insecure radio communication interface linking RFID readers to tags. The second level focuses on the privacy issues in the middleware for filtering and collecting events

No reviews

Comments:


Related posts

INTRODUCTION TO ENGINEERING DESIGN: Book 12: Engineering Skills and Robotic Challenges by Thaddeus Roppel, PDF 1935673424
Data Science Algorithms in a Week: Top 7 algorithms for computing, data analysis, and machine learning by David Natingga, PDF 1787284581
Online Communities as Agents of Change and Social Movements (Advances in Social Networking and Online Communities) by Steven Gordon, PDF 1522524959
Single Phase Fully Controlled Rectifier Using PIC Microcontroller by Nixon Johan García Gelvez, PDF 3659850365
Defects Analysis Using Ai by Ankur Bist, PDF 3330350504
Refactoring for Software Design Smells: Managing Technical Debt by Girish Suryanarayana, PDF 0128013974

Leave a Reply

Your email address will not be published. Required fields are marked *