Analysis of threats to the security of EPC networks

被引:0
|
作者
Garcia-Alfaro, Joaquin [1 ]
Barbeau, Michel [1 ]
Kranakis, Evangelos [1 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
关键词
network security; wireless security; Electronic Product Code (EPC); Radio Frequency Identification (RFID); threats analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting and responding to security and privacy threats to Electronic Product Code (EPC) and Radio Frequency IDentification (RFID) technologies are becoming major concerns of information security researchers. However and before going further in these activities, an evaluation of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats is based on a methodology proposed by the European Telecommunications Standards Institute (ETSI). According to this methodology, we rank the threats to EPC networks in order of relevance. This assesment is intended to prioritize threats for future research on appropriate countermeasure mechanisms.
引用
收藏
页码:67 / 74
页数:8
相关论文
共 50 条
  • [1] Analysis of the Information Security Threats in the Digital Production Networks
    Dakhnovich, A. D.
    Moskvin, D. A.
    Zegzhda, D. P.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 1071 - 1075
  • [2] Analysis of security threats to MPLS virtual private networks
    Grayson, Denise
    Guernsey, Daniel
    Butts, Jonathan
    Spainhower, Michael
    Shenoi, Sujeet
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (04) : 146 - 153
  • [3] Security in Photonic Networks: Threats and Security Enhancement
    Kitayama, Ken-Ichi
    Sasaki, Masahide
    Araki, Soichiro
    Tsubokawa, Makoto
    Tomita, Akihisa
    Inoue, Kyo
    Harasawa, Katsuyoshi
    Nagasako, Yuki
    Takada, Atsushi
    [J]. JOURNAL OF LIGHTWAVE TECHNOLOGY, 2011, 29 (21) : 3210 - 3222
  • [4] Security Threats in Online Social Networks
    Sadeghian, Amirmohammad
    Zamani, Mazdak
    Shanmugam, Bharanidharan
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 254 - 258
  • [5] Security Threats in Cognitive Radio Networks
    Zhang, Yuan
    Xu, Gaochao
    Geng, Xiaozhong
    [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1036 - 1041
  • [6] Security threats in Wireless Sensor Networks
    Kumar, Hiren
    Sarma, Deva
    Kar, Avijit
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2008, 23 (06) : 39 - 45
  • [7] Security Threats of Wireless Networks: A Survey
    Gupta, Akhil
    Jha, Rakesh Kumar
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 389 - 395
  • [8] Security Threats and Dealing with Social Networks
    Barati R.
    [J]. SN Computer Science, 4 (1)
  • [9] Security threats in Wireless Sensor Networks
    Sarma, Hiren Kumar Deva
    Kar, Avijit
    [J]. 2006: 40TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCES SECURITY TECHNOLOGY, PROCEEDINGS, 2006, : 243 - +
  • [10] Threats to Security of Wireless Sensor Networks
    Tyagi, Akshat
    Kushwah, Juhi
    Bhalla, Monica
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 402 - 405