Abstract
The secure integration of RFID technology into the personal network paradigm, as a context-aware technology which complements body sensor networks, would provide notable benefits to applications and potential services of the personal network (PN). RFID security as an independent technology is reaching an adequate maturity level thanks to research in recent years; however, its integration into the PN model, interaction with other network resources, remote users and service providers requires a specific security analysis and an architecture prepared to support these resource-constrained pervasive technologies. This paper provides such PN architecture and analysis. Aspects such as the management of personal tags as members of the PN, the authentication and secure communication of PN nodes and remote users with the context-aware technologies, and the enforcement of security and privacy policies are discussed in the architecture.
Keywords
This work has been partially supported by the European Community through the NESSoS (FP7-256890) project and the Spanish Ministry of Science and Innovation through the ARES (CSD2007-00004) and SPRINT (TIN2009-09237)projects. The latter is cofinanced by FEDER (European Regional Development Fund). The first author has been funded by the Spanish Ministry of Education through the National F.P.U. Program.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
International Telecommunication Union, ITU Internet Reports: The Internet of Things (November 2005)
Yum, D.H., et al.: Distance Bounding Protocol for Mutual Authentication. IEEE Transactions on Wireless Communications, 592–601 (2011)
Alomair, B., Poovendran, R.: Privacy versus Scalability in Radio Frequency Identification Systems. Computer Communication (2010)
Peris-Lopez, P., et al.: Cryptographic Puzzles and Distance-bounding Protocols: Practical Tools for RFID Security. In: IEEE International Conference on RFID 2010, Orlando, USA, pp. 45–52 (2010)
Anggraeni, P.N., Prasad, N.R., Prasad, R.: Secure personal network. In: IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1–5 (2008)
Ibrohimovna, M., et al.: Secure and Dynamic Cooperation of Personal Networks in a Fednet. In: 6th IEEE CCNC 2009, pp. 8–14 (2009)
Project IST-FP6-IP-027396, Magnet Beyond, http://magnet.aau.dk (last accessed March 2011)
Anggorjati, B., et al.: RFID Added Value Sensing Capabilities: European Advances in Integrated RFID-WSN Middleware. In: IEEE SECON 2010, pp. 1–3 (2010)
Xiaoguang, Z., Wei, L.: The research of network architecture in warehouse management system based on RFID and WSN integration. In: IEEE International Conference on ICAL 2008, pp. 2556–2560 (2008)
Tolentino, R.S., Lee, K., Kim, Y.-T., Park, G.-C.: Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network. In: Kim, T.-H., Chang, A.C.-C., Li, M., Rong, C., Patrikakis, C.Z., Ślęzak, D. (eds.) FGCN 2010. CCIS, vol. 119, pp. 147–154. Springer, Heidelberg (2010)
Memsic WSN product family, http://www.memsic.com/products/wireless-sensor-networks.html (last accessed March 2011)
Google Nexus S, http://www.google.es/nexus/tech-specs (accessed on March 2011)
Dominikus, S., Schmidt, J.-M.: Connecting Passive RFID Tags to the Internet of Things. In: Interconnecting Smart Objects with the Internet Workshop, Prague (2011)
Yu Ng, C., et al.: Practical RFID Ownership Transfer Scheme. Journal of Computer Security - Special Issue on RFID System Security (2010)
Song, B., Mitchell, C.J.: Scalable RFID Security Protocols supporting Tag Ownership Transfer, Computer Communication. Elsevier (2010)
Kapoor, G., et al.: Single RFID Tag Ownership Transfer Protocols. IEEE Transactions on Systems, Man, and Cybernetics, 1–10 (2011)
Mulligan, G.: The 6LoWPAN architecture. In: 4th Workshop on Embedded Networked Sensors, pp. 78–82. ACM, New York (2007)
Najera, P., Moyano, F., Lopez, J.: Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. Journal of Universal Computer Science 15, 970–991 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Najera, P., Roman, R., Lopez, J. (2012). Secure Architecure for the Integration of RFID and Sensors in Personal Networks. In: Meadows, C., Fernandez-Gago, C. (eds) Security and Trust Management. STM 2011. Lecture Notes in Computer Science, vol 7170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29963-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-29963-6_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29962-9
Online ISBN: 978-3-642-29963-6
eBook Packages: Computer ScienceComputer Science (R0)