Proceedings of the 4th workshop on Embedded networked sensors
Secure and dynamic cooperation of personal networks in a Fednet
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
Practical RFID ownership transfer scheme
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Distance Bounding Protocol for Mutual Authentication
IEEE Transactions on Wireless Communications
Single RFID Tag Ownership Transfer Protocols
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Hi-index | 0.00 |
The secure integration of RFID technology into the personal network paradigm, as a context-aware technology which complements body sensor networks, would provide notable benefits to applications and potential services of the personal network (PN). RFID security as an independent technology is reaching an adequate maturity level thanks to research in recent years; however, its integration into the PN model, interaction with other network resources, remote users and service providers requires a specific security analysis and an architecture prepared to support these resource-constrained pervasive technologies. This paper provides such PN architecture and analysis. Aspects such as the management of personal tags as members of the PN, the authentication and secure communication of PN nodes and remote users with the context-aware technologies, and the enforcement of security and privacy policies are discussed in the architecture.