1 / 3

Secure integration of RFID & BSN in Personal Networks

Secure integration of RFID & BSN in Personal Networks. RFID as additional sensing source : item presence and relevant metadata Benefits : reach more personal items, on-item history log, secure management of personal data, user authentication in context…

jonco
Download Presentation

Secure integration of RFID & BSN in Personal Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure integration of RFID & BSN in Personal Networks • RFID as additional sensing source: item presence and relevant metadata • Benefits: reach more personal items, on-item history log, secure management of personal data, user authentication in context… • Secure access to RFID-enabled personal objects and documentation from PN members and remote PNs and service providers • Integration of RFID technology and BSNs at physical and logic levels

  2. Secure software architecture for personal networks • PN architecture support local and remote access to resource-constrained tags • RFID-enabled objects registered as PN members. • Authentication and authorization of requesting entities • Secure management of context data. Filtering and anonymization • Establishment of secure tunnel between external entities and restricted nodes. Proxy and gateway nodes

  3. Management of RFID & sensor nodes in the PN architecture • Incorporation of RFID nodes in PN: selection of authentication protocols, management of heterogeneous cryptographic materials, adoption of tags from external sources • Adaptation of RFID tag ownership transfer schemes for PNs and tag ownership sharing • Access to context-aware technologies in PN: direct access vs aggregated knowledge • Low level communication with final entities. Reduced granularity control • Decoupling queries from actual access to nodes. Fine-grained filtering of sensitive data • Alternatives in secure direct access to RFID nodes • Proxy nodes as command forwarders vs command gateways • Management of RFID tag authentication credentials for remote nodes • Enforcement of privacy policies in the access to personal tags

More Related