2005 | OriginalPaper | Chapter
Modeling RFID Security
Authors : Xiaolan Zhang, Brian King
Published in: Information Security and Cryptology
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
Many security and privacy protocols for RFID systems have been proposed [7] [12] [6] [11]. In most cases these protocols are evaluated in terms of security based on some model. Here we describe several of the security requirements that are needed in an RFID system and model these requirements. They include privacy of tag data, privacy of ownership, integrity of tag data, and availability of tag identity. We also construct less restrictive versions of many of these models to reflect the security needed for some less security-intensive RFID applications and compare them to existing models.