112405 - A method for whole of system analysis of RFID security.pdf (469.81 kB)
A method for whole of system analysis of RFID security
conference contributionposted on 2023-05-23, 11:32 authored by Mirowski, LT
Existing methods for analysis of security in Radio Frequency Identification (RFID) systems take a relatively localized view of security. Rotter (2008) proposed a privacy and security risk assessment framework which was used to assess domain risks using three criteria. Mitrokotsa et al. (2008; 2009) structured threats into system layers, enumerating the threats as well as offering potential defenses for each layer. Since then there has been limited focus on a reference model based approach to RFID security. Therefore, work reported here addresses the existing gap in the RFID security analysis field by introducing a ‘whole of system’ approach to analysis, made possible by way of a reference model, consisting of the three horizontal layers suggested by previous authors: real world, RFID and strategic. But at the same time, adds vertical security partitions for such things as the problem context. This provides a structure that allows existing methods to be applied systematically and across the ‘whole system’.
Publication titleProceedings of the 27th Australasian Conference on Information Systems
Department/SchoolSchool of Engineering
PublisherUniversity of Wollongong
Place of publicationAustralia
Event title27th Australasian Conference on Information Systems
Event VenueWollongong, Australia
Date of Event (Start Date)2016-12-05
Date of Event (End Date)2016-12-07
Rights statementCopyright 2016 the Author. Licensed under Creative Commons Attribution-NonCommercial 3.0 Australia License (CC BY-NC 3.0 AU), https://creativecommons.org/licenses/by-nc/3.0/au/ which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and ACIS are credited.