2006
DOI: 10.1007/11872153_43
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Implementation Leveraging Globally Networked RFIDs

Abstract: Abstract. Mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and profiling using RFID technology. Therefore, in this paper, we describe the security analysis and implementa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 28 publications
(3 citation statements)
references
References 6 publications
(7 reference statements)
0
2
0
Order By: Relevance
“…As cyberattacks become diverse and sophisticated, researchers in that field are studying not only defense strategies but, also, the prediction of cyberattacks, and the Science of Security is being also increasingly studied, in which assumptions on physical security, managerial security and information security and their verifications are conducted and new knowledge are created. In addition, various research and projects approaching cyberattacks from different perspectives are underway [46].…”
Section: Conclusion and Future Plansmentioning
confidence: 99%
“…As cyberattacks become diverse and sophisticated, researchers in that field are studying not only defense strategies but, also, the prediction of cyberattacks, and the Science of Security is being also increasingly studied, in which assumptions on physical security, managerial security and information security and their verifications are conducted and new knowledge are created. In addition, various research and projects approaching cyberattacks from different perspectives are underway [46].…”
Section: Conclusion and Future Plansmentioning
confidence: 99%
“…By intuition, To execute an interval query, the frontend must execute quires needed to go down the tree node. Once reached a leaf, the node ID within the leaf can be used to compose tuple [23][24][25][26][27].…”
Section: B+treementioning
confidence: 99%
“…The mobile RFID network function is concerned with the communication protocols such as the ODS communication for code interpretation, the message transmission for the transmission and reception of contents between the cellular phone terminal and the application server, contents negotiation that supports mobile RFID service environment and ensures the optimum contents transfer between the cellular phone terminal and the application server, and session management that enables the application to create and manage required status information while transmitting the message and the WIPI extended specification which supports these communication services. The mobile RFID middleware is implemented by extending the WIPI platform to provide RF code-related information obtained from the RF tag through the RFID reader installed in the mobile phone (Mobile RFID Forum of Korea, 2005aPark et al, 2006c;Park et al, 2006d). The functions of RFID WIPI C API include RFID reader control, buffer control, tag control, filtering, networking for code decoding, URN conversion, FQDN conversion, DNS resolving and the content services.…”
Section: Data Processing Using Middleware Platformmentioning
confidence: 99%