Cargando…

Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolut...

Descripción completa

Detalles Bibliográficos
Autores principales: Tang, Wan, Chen, Min, Ni, Jin, Yang, Ximin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Molecular Diversity Preservation International (MDPI) 2011
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231674/
https://www.ncbi.nlm.nih.gov/pubmed/22163983
http://dx.doi.org/10.3390/s110706743
_version_ 1782218261379678208
author Tang, Wan
Chen, Min
Ni, Jin
Yang, Ximin
author_facet Tang, Wan
Chen, Min
Ni, Jin
Yang, Ximin
author_sort Tang, Wan
collection PubMed
description The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.
format Online
Article
Text
id pubmed-3231674
institution National Center for Biotechnology Information
language English
publishDate 2011
publisher Molecular Diversity Preservation International (MDPI)
record_format MEDLINE/PubMed
spelling pubmed-32316742011-12-07 Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems Tang, Wan Chen, Min Ni, Jin Yang, Ximin Sensors (Basel) Article The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system. Molecular Diversity Preservation International (MDPI) 2011-06-28 /pmc/articles/PMC3231674/ /pubmed/22163983 http://dx.doi.org/10.3390/s110706743 Text en © 2011 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Tang, Wan
Chen, Min
Ni, Jin
Yang, Ximin
Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems
title Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems
title_full Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems
title_fullStr Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems
title_full_unstemmed Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems
title_short Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems
title_sort security enhancement mechanism based on contextual authentication and role analysis for 2g-rfid systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231674/
https://www.ncbi.nlm.nih.gov/pubmed/22163983
http://dx.doi.org/10.3390/s110706743
work_keys_str_mv AT tangwan securityenhancementmechanismbasedoncontextualauthenticationandroleanalysisfor2grfidsystems
AT chenmin securityenhancementmechanismbasedoncontextualauthenticationandroleanalysisfor2grfidsystems
AT nijin securityenhancementmechanismbasedoncontextualauthenticationandroleanalysisfor2grfidsystems
AT yangximin securityenhancementmechanismbasedoncontextualauthenticationandroleanalysisfor2grfidsystems