112405 - A method for whole of system analysis of RFID security.pdf (469.81 kB)
A method for whole of system analysis of RFID security
conference contribution
posted on 2023-05-23, 11:32 authored by Mirowski, LTExisting methods for analysis of security in Radio Frequency Identification (RFID) systems take a relatively localized view of security. Rotter (2008) proposed a privacy and security risk assessment framework which was used to assess domain risks using three criteria. Mitrokotsa et al. (2008; 2009) structured threats into system layers, enumerating the threats as well as offering potential defenses for each layer. Since then there has been limited focus on a reference model based approach to RFID security. Therefore, work reported here addresses the existing gap in the RFID security analysis field by introducing a ‘whole of system’ approach to analysis, made possible by way of a reference model, consisting of the three horizontal layers suggested by previous authors: real world, RFID and strategic. But at the same time, adds vertical security partitions for such things as the problem context. This provides a structure that allows existing methods to be applied systematically and across the ‘whole system’.
History
Publication title
Proceedings of the 27th Australasian Conference on Information SystemsPagination
1-11Department/School
School of EngineeringPublisher
University of WollongongPlace of publication
AustraliaEvent title
27th Australasian Conference on Information SystemsEvent Venue
Wollongong, AustraliaDate of Event (Start Date)
2016-12-05Date of Event (End Date)
2016-12-07Rights statement
Copyright 2016 the Author. Licensed under Creative Commons Attribution-NonCommercial 3.0 Australia License (CC BY-NC 3.0 AU), https://creativecommons.org/licenses/by-nc/3.0/au/ which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and ACIS are credited.Repository Status
- Open