2012
DOI: 10.1007/978-3-642-29963-6_15
|View full text |Cite
|
Sign up to set email alerts
|

Secure Architecure for the Integration of RFID and Sensors in Personal Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Security of RFID as an independent technology is reaching an adequate maturity level, thanks to research advances in recent years; however, its integration into the PN model, interaction with other network resources, remote users, and service providers, requires a specific security analysis and a secure PN architecture prepared to support these heterogeneous pervasive technologies. Although an increasing amount of research is focusing on the PN paradigms with the proposal of some network architectures and the benefits of the integration of wireless sensor networks and RFID technology have already driven the proposal of several architectures in different scenarios , to the best of our knowledge, no architecture had introduced the secure integration of RFID and wireless sensor networks technologies in PNs until our initial proposal . This paper expands on our previous work and exposes the benefits of the collaboration of RFID and sensor technologies in PN networks, analyzes how this integration could be achieved, and defines a secure PN architecture that provides the foundations in order to securely register and maintain the personal tags as members of the PN, authenticate and authorize PN nodes and remote devices in their requests to access these context‐aware technologies, provide a secure tunnel to communicate with this non‐IP‐enabled entities, and enforce the fulfillment of security and privacy policies in these communications.…”
Section: Introductionmentioning
confidence: 94%
“…Security of RFID as an independent technology is reaching an adequate maturity level, thanks to research advances in recent years; however, its integration into the PN model, interaction with other network resources, remote users, and service providers, requires a specific security analysis and a secure PN architecture prepared to support these heterogeneous pervasive technologies. Although an increasing amount of research is focusing on the PN paradigms with the proposal of some network architectures and the benefits of the integration of wireless sensor networks and RFID technology have already driven the proposal of several architectures in different scenarios , to the best of our knowledge, no architecture had introduced the secure integration of RFID and wireless sensor networks technologies in PNs until our initial proposal . This paper expands on our previous work and exposes the benefits of the collaboration of RFID and sensor technologies in PN networks, analyzes how this integration could be achieved, and defines a secure PN architecture that provides the foundations in order to securely register and maintain the personal tags as members of the PN, authenticate and authorize PN nodes and remote devices in their requests to access these context‐aware technologies, provide a secure tunnel to communicate with this non‐IP‐enabled entities, and enforce the fulfillment of security and privacy policies in these communications.…”
Section: Introductionmentioning
confidence: 94%