Many security and privacy protocols for RFID systems have been proposed    . In most cases these protocols are evaluated in terms of security based on some model. Here we describe several of the security requirements that are needed in an RFID system and model these requirements. They include privacy of tag data, privacy of ownership, integrity of tag data, and availability of tag identity. We also construct less restrictive versions of many of these models to reflect the security needed for some less security-intensive RFID applications and compare them to existing models.
Weitere Kapitel dieses Buchs durch Wischen aufrufen
- Modeling RFID Security
- Springer Berlin Heidelberg
Neuer Inhalt/© ITandMEDIA