Skip to main content

Secure Architecure for the Integration of RFID and Sensors in Personal Networks

  • Conference paper
Book cover Security and Trust Management (STM 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7170))

Included in the following conference series:

  • 682 Accesses

Abstract

The secure integration of RFID technology into the personal network paradigm, as a context-aware technology which complements body sensor networks, would provide notable benefits to applications and potential services of the personal network (PN). RFID security as an independent technology is reaching an adequate maturity level thanks to research in recent years; however, its integration into the PN model, interaction with other network resources, remote users and service providers requires a specific security analysis and an architecture prepared to support these resource-constrained pervasive technologies. This paper provides such PN architecture and analysis. Aspects such as the management of personal tags as members of the PN, the authentication and secure communication of PN nodes and remote users with the context-aware technologies, and the enforcement of security and privacy policies are discussed in the architecture.

This work has been partially supported by the European Community through the NESSoS (FP7-256890) project and the Spanish Ministry of Science and Innovation through the ARES (CSD2007-00004) and SPRINT (TIN2009-09237)projects. The latter is cofinanced by FEDER (European Regional Development Fund). The first author has been funded by the Spanish Ministry of Education through the National F.P.U. Program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. International Telecommunication Union, ITU Internet Reports: The Internet of Things (November 2005)

    Google Scholar 

  2. Yum, D.H., et al.: Distance Bounding Protocol for Mutual Authentication. IEEE Transactions on Wireless Communications, 592–601 (2011)

    Google Scholar 

  3. Alomair, B., Poovendran, R.: Privacy versus Scalability in Radio Frequency Identification Systems. Computer Communication (2010)

    Google Scholar 

  4. Peris-Lopez, P., et al.: Cryptographic Puzzles and Distance-bounding Protocols: Practical Tools for RFID Security. In: IEEE International Conference on RFID 2010, Orlando, USA, pp. 45–52 (2010)

    Google Scholar 

  5. Anggraeni, P.N., Prasad, N.R., Prasad, R.: Secure personal network. In: IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1–5 (2008)

    Google Scholar 

  6. Ibrohimovna, M., et al.: Secure and Dynamic Cooperation of Personal Networks in a Fednet. In: 6th IEEE CCNC 2009, pp. 8–14 (2009)

    Google Scholar 

  7. Project IST-FP6-IP-027396, Magnet Beyond, http://magnet.aau.dk (last accessed March 2011)

  8. Anggorjati, B., et al.: RFID Added Value Sensing Capabilities: European Advances in Integrated RFID-WSN Middleware. In: IEEE SECON 2010, pp. 1–3 (2010)

    Google Scholar 

  9. Xiaoguang, Z., Wei, L.: The research of network architecture in warehouse management system based on RFID and WSN integration. In: IEEE International Conference on ICAL 2008, pp. 2556–2560 (2008)

    Google Scholar 

  10. Tolentino, R.S., Lee, K., Kim, Y.-T., Park, G.-C.: Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network. In: Kim, T.-H., Chang, A.C.-C., Li, M., Rong, C., Patrikakis, C.Z., Ślęzak, D. (eds.) FGCN 2010. CCIS, vol. 119, pp. 147–154. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Memsic WSN product family, http://www.memsic.com/products/wireless-sensor-networks.html (last accessed March 2011)

  12. Google Nexus S, http://www.google.es/nexus/tech-specs (accessed on March 2011)

  13. Dominikus, S., Schmidt, J.-M.: Connecting Passive RFID Tags to the Internet of Things. In: Interconnecting Smart Objects with the Internet Workshop, Prague (2011)

    Google Scholar 

  14. Yu Ng, C., et al.: Practical RFID Ownership Transfer Scheme. Journal of Computer Security - Special Issue on RFID System Security (2010)

    Google Scholar 

  15. Song, B., Mitchell, C.J.: Scalable RFID Security Protocols supporting Tag Ownership Transfer, Computer Communication. Elsevier (2010)

    Google Scholar 

  16. Kapoor, G., et al.: Single RFID Tag Ownership Transfer Protocols. IEEE Transactions on Systems, Man, and Cybernetics, 1–10 (2011)

    Google Scholar 

  17. Mulligan, G.: The 6LoWPAN architecture. In: 4th Workshop on Embedded Networked Sensors, pp. 78–82. ACM, New York (2007)

    Chapter  Google Scholar 

  18. Najera, P., Moyano, F., Lopez, J.: Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. Journal of Universal Computer Science 15, 970–991 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Najera, P., Roman, R., Lopez, J. (2012). Secure Architecure for the Integration of RFID and Sensors in Personal Networks. In: Meadows, C., Fernandez-Gago, C. (eds) Security and Trust Management. STM 2011. Lecture Notes in Computer Science, vol 7170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29963-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29963-6_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29962-9

  • Online ISBN: 978-3-642-29963-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics