14,778 research outputs found
A New Framework for RFID Privacy
Formal RFID security and privacy frameworks are fundamental to the design and analysis of robust RFID systems. In this paper, we develop a new definitional framework for RFID privacy in a rigorous and precise manner. Our framework is based on a zero-knowledge (ZK) formulation [7, 5] and incorporates the notions of adaptive completeness and mutual authentication. We provide meticulous
justification of the new framework and contrast it with existing ones in the literature. In particular, we prove that our framework is stronger than the ind-privacy model of [14], which answers an open question posed in [14] for developing stronger RFID privacy models. Along the way we also try to clarify certain confusions and rectify several defects in the existing frameworks.
Based on the protocol of [16], we propose an efficient RFID mutual authentication protocol and analyze its security and privacy. The methodology used in our analysis is of independent interest and can be applied to analyze other RFID protocols within the new framework
A new framework for RFID privacy
A*Star SERC; Singapore Management Universit
The RFID PIA – developed by industry, agreed by regulators
This chapter discusses the privacy impact assessment (PIA) framework endorsed
by the European Commission on February 11th, 2011. This PIA, the first to receive the
Commission's endorsement, was developed to deal with privacy challenges associated with
the deployment of radio frequency identification (RFID) technology, a key building block of
the Internet of Things. The goal of this chapter is to present the methodology and key
constructs of the RFID PIA Framework in more detail than was possible in the official text.
RFID operators can use this article as a support document when they conduct PIAs and need
to interpret the PIA Framework. The chapter begins with a history of why and how the PIA
Framework for RFID came about. It then proceeds with a description of the endorsed PIA
process for RFID applications and explains in detail how this process is supposed to function.
It provides examples discussed during the development of the PIA Framework. These
examples reflect the rationale behind and evolution of the text's methods and definitions. The
chapter also provides insight into the stakeholder debates and compromises that have
important implications for PIAs in general.Series: Working Papers on Information Systems, Information Business and Operation
A Privacy Preserving Framework for RFID Based Healthcare Systems
RFID (Radio Frequency IDentification) is anticipated to be a core technology that will be used in many practical applications of our life in near future. It has received considerable attention within the healthcare for almost a decade now. The technology’s promise to efficiently track hospital supplies, medical equipment, medications and patients is an attractive proposition to the healthcare industry. However, the prospect of wide spread use of RFID tags in the healthcare area has also triggered discussions regarding privacy, particularly because RFID data in transit may easily be intercepted and can be send to track its user (owner). In a nutshell, this technology has not really seen its true potential in healthcare industry since privacy concerns raised by the tag bearers are not properly addressed by existing identification techniques. There are two major types of privacy preservation techniques that are required in an RFID based healthcare system—(1) a privacy preserving authentication protocol is required while sensing RFID tags for different identification and monitoring purposes, and (2) a privacy preserving access control mechanism is required to restrict unauthorized access of private information while providing healthcare services using the tag ID. In this paper, we propose a framework (PriSens-HSAC) that makes an effort to address the above mentioned two privacy issues. To the best of our knowledge, it is the first framework to provide increased privacy in RFID based healthcare systems, using RFID authentication along with access control technique
Accessing Antecedents and Outcomes of RFID Implementation in Health Care
This research first conceptualizes, develops, and validates four constructs for studying RFID in health care, including Drivers (Internal and External), Implementation Level (Clinical Focus and Administrative Focus), Barriers (Cost Issues, Lack of Understanding, Technical Issues, and Privacy and Security Concerns), and Benefits (Patient Care, Productivity, Security and Safety, Asset Management, and Communication). Data for the study were collected from 88 health care organizations and the measurement scales were validated using structural equation modeling. Second, a framework is developed to discuss the causal relationships among the above mentioned constructs. It is found that Internal Drivers are positively related to Implementation Level, which in turn is positively related to Benefits and Performance. In addition, Barriers are found to be positively related to Implementation Level, which is in contrast to the originally proposed negative relationship. The research also compares perception differences regarding RFID implementation among the non-implementers, future implementers, and current implementers of RFID. It is found that both future implementers and current implementers consider RFID barriers to be lower and benefits to be higher compared to the non-implementers. This paper ends with our research implications, limitations and future research
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
Security and privacy are the inherent problems in RFID communications. There
are several protocols have been proposed to overcome those problems. Hash chain
is commonly employed by the protocols to improve security and privacy for RFID
authentication. Although the protocols able to provide specific solution for
RFID security and privacy problems, they fail to provide integrated solution.
This article is a survey to closely observe those protocols in terms of its
focus and limitations.Comment: Third ICCIT 2008 International Conference on Convergence and Hybrid
Information Technolog
Critical Management Issues for Implementing RFID in Supply Chain Management
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains
Reviewing the Drivers and Challenges in RFID Implementation in the Pharmaceutical Supply Chain
Counterfeiting is a global phenomenon that poses a serious financial threat to the pharmaceutical industry and more importantly jeopardizes public safety and security. Different measures, including new laws and regulations, have been put in place to mitigate the threat and tighten control in the pharmaceuticals supply chain. However, it appears that the most promising countermeasure is track-and-trace technology such as electronic-pedigree (E-pedigree) with Radio Frequency Identification (RFID) technology. In this study we present a framework exploring the antecedents and consequences of RFID applications in the pharmaceutical supply chain. The framework proposes that counterfeiting and E-pedigree regulation will drive the implementation of RFID in the pharmaceutical supply chain, which in turn provides strategic and operational benefits that enable competitive advantage. Meanwhile, the implementation of RFID requires overcoming many operational, technical and financial challenges. The framework provides a springboard that future study can explore using empirical data
- …