eCite Digital Repository

A method for whole of system analysis of RFID security

Citation

Mirowski, LT, A method for whole of system analysis of RFID security, Proceedings of the 27th Australasian Conference on Information Systems, 5-7 December 2016, Wollongong, Australia, pp. 1-11. (2016) [Refereed Conference Paper]


Preview
PDF
470Kb
  

Copyright Statement

Copyright 2016 the Author. Licensed under Creative Commons Attribution-NonCommercial 3.0 Australia License (CC BY-NC 3.0 AU), https://creativecommons.org/licenses/by-nc/3.0/au/ which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and ACIS are credited.

Official URL: http://ro.uow.edu.au/acis2016/

Abstract

Existing methods for analysis of security in Radio Frequency Identification (RFID) systems take a relatively localized view of security. Rotter (2008) proposed a privacy and security risk assessment framework which was used to assess domain risks using three criteria. Mitrokotsa et al. (2008; 2009) structured threats into system layers, enumerating the threats as well as offering potential defenses for each layer. Since then there has been limited focus on a reference model based approach to RFID security. Therefore, work reported here addresses the existing gap in the RFID security analysis field by introducing a ‘whole of system’ approach to analysis, made possible by way of a reference model, consisting of the three horizontal layers suggested by previous authors: real world, RFID and strategic. But at the same time, adds vertical security partitions for such things as the problem context. This provides a structure that allows existing methods to be applied systematically and across the ‘whole system’.

Item Details

Item Type:Refereed Conference Paper
Keywords:traceability, provenance, tagging, RFID, security
Research Division:Information and Computing Sciences
Research Group:Information Systems
Research Field:Global Information Systems
Objective Division:Information and Communication Services
Objective Group:Computer Software and Services
Objective Field:Information Processing Services (incl. Data Entry and Capture)
Author:Mirowski, LT (Dr Luke Mirowski)
ID Code:112405
Year Published:2016
Deposited By:Engineering
Deposited On:2016-11-09
Last Modified:2018-05-04
Downloads:10 View Download Statistics

Repository Staff Only: item control page