Abstract

Integrity checking is important in many activities such as. While the computing and telecommunication worlds commonly use digital integrity checking, many activities from the real world do not beneficiate from automatic mechanisms for ensuring integrity. We propose the concept of coupled objects where groups of physical objects are tagged with RFID chips enabling pervasive and autonomous integrity checking.

Keywords

Pervasive computing security integrity RFID 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bohn, J., Mattern, F.: Super-distributed rfid tag infrastructures. In: Markopoulos, P., Eggen, B., Aarts, E., Crowley, J.L. (eds.) EUSAI 2004. LNCS, vol. 3295, pp. 1–12. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  2. 2.
    Floerkemeier, C., Lampe, M., Schoch, T.: The smart box concept for ubiquitous computing environments. In: Proceedings of sOc 2003 (Smart Objects Conference), Grenoble, pp. 118–121 (May 2003)Google Scholar
  3. 3.
    Kraemer, R.: The bluetooth briefcase: Intelligent luggage for increased security (2004), http://www-rnks.informatik.tu-cottbus.de/content/unrestricted/teachings/2004/

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  • Paul Couderc
    • 1
  • Michel Banâtre
    • 1
  • Fabien Allard
    • 1
  1. 1.INRIA Rennes, Campus Universitaire de BeaulieuRennes CecexFrance

Personalised recommendations