首页 | 本学科首页   官方微博 | 高级检索  
     


Lightweight protocols and privacy for all-in-silicon objects
Authors:Denis Trček
Affiliation:1. Computer Science Dept., Harbin Engineering University, Harbin 150001, China;2. Automation Dept., Harbin Engineering University, Harbin 150001, China;3. Underwater Acoustic Engineering Dept., Harbin Engineering University, Harbin 150001, China;1. Department of Electrical Engineering University at Buffalo, The State University of New York, 230 Davis Hall, Buffalo, NY 14260, United States;2. Department of Electrical Engineering University at Buffalo, The State University of New York, 332, Bonner Hall, Buffalo, NY 14260, United States;1. Department of Environmental Sciences and Engineering, Fudan University, 220 Handan Road, Shanghai 200433, PR China;2. South China Institute of Environmental Sciences, Ministry of Environmental Protection, Guangzhou, PR China;3. Department of Geography, The University of Hong Kong, Hong Kong Special Administrative Region, PR China
Abstract:Pervasive computing is already becoming a reality and one crucial consequence of this fact is endangered privacy. Now taking into account typical properties of pervasive computing devices, which are weak computing power and stringent energy or power consumption limitations, lightweight solutions are a must. This especially holds true for all-in-silicon objects like radio frequency identification tags, or RFIDs. Many solutions in this area are called lightweight, but being lightweight requires conformance to quantitative requirements using certain metrics. A solution that adheres to such requirements is a new privacy enabling protocol for RFIDs that outperforms other architecturally similar protocols, and this presents the first contribution of this paper. Further, privacy is not only a matter of technical solutions, but increasingly so a matter of organizational processes. This fact calls for further addressing of supporting its formal treatment in business contexts. This paper provides a basis for formal addressing of privacy from business processes perspective, and this is its second main contribution.
Keywords:Wireless sensor networks  RFID technology  Security  Privacy  Lightweight protocols  Security policies
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号