An interoperable internet scale solution for RFID network security

Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for RFID networks is proposed. The IISS framework performs authentication and auth...

Full description

Bibliographic Details
Main Authors: Mao, Tingting (Contributor), Sanchez, Abel (Contributor), Williams, John R (Author)
Other Authors: Massachusetts Institute of Technology. Auto-ID Laboratory (Contributor), Massachusetts Institute of Technology. Department of Civil and Environmental Engineering (Contributor), Massachusetts Institute of Technology. Laboratory for Manufacturing and Productivity (Contributor), Williams, John R. (Contributor)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers, 2010-11-08T14:17:03Z.
Subjects:
Online Access:Get fulltext
Description
Summary:Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for RFID networks is proposed. The IISS framework performs authentication and authorization based on an aggregation of business rules, enterprise information, and RFID tag information. IISS provides a protocol for several authentication schemes and identity techniques. It also provides an engine for reasoning over business rules from different domains. Moreover, the IISS framework is able to resolve provenance information of RFID tags, which can identify the history of a particular piece of EPC data through the supply chain. The IISS framework and the IISS ontologies to model the information in RFID networks are also described, and how the IISS framework can be developed for access control in RFID enabled supply chains is discussed. Finally, the IISS framework's efficiency is tested using a supply chain EPC simulator as the testing platform, which allows optimization of the IISS protocol's performance.