Abstract
After the analysis and classification of related work, I deal with specific security requirements for RFID environments in the following. I focus on why business relationships in global supply chains need to be analyzed in detail with respect to security.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Office of Transportation and Machinery U.S. Department of Commerce. U.S. Automotive Parts Industry Annual Assessment (2011), http://trade.gov/wcm/groups/public/@trade/@mas/@man/@aai/documents/web_content/auto_reports_parts2009.pdf. Accessed 8 Mar 2012
International Organization for Standardization. ISO/IEC 9001:2008—Quality Management Systems—Requirements, (2008)
International Organization for Standardization. Expected outcomes for accredited certification to ISO 9001 (2011), http://www.iso.org/iso/definitive_expected_outcomes_iso9001.pdf. Accessed 8 Mar 2012
Federal Office for Information Security. BSI Standard 100–1: Information Security Management, System V.1.5 (2008)
International Organization for Standardization. ISO/IEC 27001:2005—Information Technology—Security Techniques—Information Security Management Systems–Requirements (2005)
S. Wendt, Nichtphysikalische Grundlagen der Informationstechnik: Interpretierte Formalismen, Vol 2 ( Springer, Berlin, 1991)
M. Stamp, Information Security: Principles and Practice. (John Wiley and Sons, New York, 2006)
Federal Office for Information Security. BSI Standard 100–3: Risk Analysis based on IT-Grundschutz V. 2.5 (2008)
Simson L. Garfinkel, Ari Juels, Ravi Pappu, RFID privacy: an overview of problems and proposed solutions. IEEE Secur. Priv. 3, 34–43 (2005)
Global Standards 1. Tag Data Standards 1.6 (2011), http://www.gs1.org/gsmp/kc/epcglobal/tds/tds_1_6-RatifiedStd-20110922.pdf. Accessed 8 Mar 2012
M-P. Schapranow, A. Zeier, F. Leupold, T. Schubotz, Securing EPCglobal Object Name Service—Privacy Enhancements for Anti-counterfeiting. In Proceedings of the 2nd International Conference on Intelligent Systems, Modeling and Simulation. IEEE Computer Society, (2011), pp. 332–337
M-P. Schapranow, A. Zeier, H. Plattner, A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access. In Proceedings of the 4th International Conference on Network and System Security, (2010)
K. Koscher et al., EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond. Manuscript (2008)
H. Hwang et al., A Study on MITM Vulnerability in Wireless Network Using 802.1X and EAP. In Proceedings of the International Conference on Information Science and Security, Washington, DC, USA, IEEE Computer Society, (2008), pp. 164–170
Global Standards 1. EPC Radio-Frequency Identity Protocols - Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz - 1.2.0 (2008), http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf. Accessed 8 Mar 2012
Hossein Bidgoli, Handbook of Information Security (John Wiley and Sons, Inc., New York, 2006)
Bayer Technology Services. Sicher, schnell & einfach - Einmalige Zufallszahlen mit dem BayCoder (2011), http://www.bayertechnology.com/uploads/media/Infoblatt_TTA_BayCoder_D_030811.pdf. Accessed 8 Mar 2012
J.M. Stewart, E. Tittel, M. Chapple, Certified Information Systems Security Professional Study Guide, 3rd edn. (Sybex, New York, 2005)
D. Russell, G.T. Gangemi, Sr. Computer Security Basics (O’Reilly & Associates Inc., Sebastopol, 1991)
A. Juels, Minimalist Cryptography for Low-Cost RFID Tags, eds. by C. Blundo, S. Cimato Security in Communication Networks. Lecture Notes in Computer Science, Vol 3352 (Springer, Berlin , 2005), pp. 149–164
M. Beck, E. Tews, Practical Attacks against WEP and WPA (2008), http://dl.aircrack-ng.org/breakingwepandwpa.pdf. Accessed 8 Mar 2012
W. Stallings, Cryptography and Network Security, 4th edn. (Prentice Hall, New Delh, 2005)
U. Waldmann, U. Waldmann, K. Sohr, RFID-Studie 2007: Technologieintegrierte Datensicherheit bei RFID-Systemen (Studie, Fraunhofer-Institut für Sichere Informations-Technologie (SIT), Darmstadt, 2007)
I. Sommerville, Software Engineering. (Addison-Wesley, New York, 2007)
Supply Chain Council. Supply Chain Operations Reference Model V.10. Whitepaper (2010)
M-P. Schapranow et al., What are Authentic Pharmaceuticals Worth?, chapter 13 (INTECH Press, New York, 2011), pp. 203–220
L. Vilkov, B. Weiß, Prozessorientierte Wirtschaftlichkeitsanalyse von RFID-Systemen anhand eines Referenz-Wirkungsmodells (Springer, Heidelberg, 2008), pp. 275–304
G.F. Knolmayer, P. Mertens, A. Zeier, Supply Chain Management Based on SAP Systems: Architecture and Planning Processes SAP Excellence (Springer, Berlin, 2009)
J. Müller et al., RFID Middleware as a Service—Enabling Small and Medium-sized Enterprises to Participate in the EPC Network. In Proceedings of the 16th International Conference on Industry Engineering and Engineering Management, Vol 2 (2009), pp. 2040–2043
T.R. Henderson et al., Network Simulations with the ns-3 Simulator. Computer Engineering (2006), pp. 173-182
M-P. Schapranow, A. Zeier, H. Plattner, A Formal Model for Enabling RFID in Pharmaceutical Supply Chains. In Proceedings of the 44th Hawaii International Conference on System Sciences (2011)
E. Gamma, Design Patterns: Elements of Reusable Object-oriented Software (Addison-Wesley, London, 1995)
M-P. Schapranow, C. Faehnrich, A. Zeier, H. Plattner, Simulation of RFID-aided Supply Chains: Case Study of the Pharmaceutical Industry. In Proceedings of the 3rd International Conference on Computational Intelligence, Modelling and, Simulation, (2011)
A. Juels, R.L. Rivest, M. Szydlo, The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In Proceedings of the 10th Conference on Computer and Communication Security, New York, NY, USA, (2003), pp. 103–111
M-P. Schapranow, Transaction Processing 2.0: The Epochal Change in Designing Transaction Processing Systems. Master’s thesis, Hasso Plattner Institute (2008)
H. Plattner, A. Zeier, In-Memory Data Management: An Inflection Point for Enterprise Applications (Springer, Berlin, 2011)
P. Svensson, The Evolution of Vertical Database Architectures—A Historical Review. In Proceedings of the 20th International Conference on Scientific and Statistical Database Management (Springer, New York, 2008), pp. 3–5
S. Lightstone, T.J. Teorey, T. Nadeau, Physical Database Design: The Database Professional’s Guide to Exploiting Indexes, Views, Storage, and more (Elsevier, New York, 2007)
J.M. Hellerstein, M. Stonebraker, J. Hamilton, Architecture of a Database System, Foundation and Trends in Databases, Vol 1 (Now Publishers, New York, 2007)
S. Andrew, Tanenbaum Modern Operating Systems, 3rd edn. (Prentice Hall Press, Paramus, 2008)
J.M. Hellerstein, M. Stonebraker, Readings in Database Systems, 4th edn. (MIT Press, New York, 2005)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schapranow, MP. (2014). Security in EPCglobal Networks. In: Real-time Security Extensions for EPCglobal Networks. In-Memory Data Management Research. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36343-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-36343-6_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36342-9
Online ISBN: 978-3-642-36343-6
eBook Packages: Business and EconomicsBusiness and Management (R0)