posted on 2023-05-23, 11:32authored byMirowski, LT
Existing methods for analysis of security in Radio Frequency Identification (RFID) systems take a relatively localized view of security. Rotter (2008) proposed a privacy and security risk assessment framework which was used to assess domain risks using three criteria. Mitrokotsa et al. (2008; 2009) structured threats into system layers, enumerating the threats as well as offering potential defenses for each layer. Since then there has been limited focus on a reference model based approach to RFID security. Therefore, work reported here addresses the existing gap in the RFID security analysis field by introducing a ‘whole of system’ approach to analysis, made possible by way of a reference model, consisting of the three horizontal layers suggested by previous authors: real world, RFID and strategic. But at the same time, adds vertical security partitions for such things as the problem context. This provides a structure that allows existing methods to be applied systematically and across the ‘whole system’.
History
Publication title
Proceedings of the 27th Australasian Conference on Information Systems
Pagination
1-11
Department/School
School of Engineering
Publisher
University of Wollongong
Place of publication
Australia
Event title
27th Australasian Conference on Information Systems
Event Venue
Wollongong, Australia
Date of Event (Start Date)
2016-12-05
Date of Event (End Date)
2016-12-07
Rights statement
Copyright 2016 the Author. Licensed under Creative Commons Attribution-NonCommercial 3.0 Australia License (CC BY-NC 3.0 AU), https://creativecommons.org/licenses/by-nc/3.0/au/ which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and ACIS are credited.
Repository Status
Open
Socio-economic Objectives
Information systems, technologies and services not elsewhere classified