Lightweight protocols and privacy for all-in-silicon objects |
| |
Authors: | Denis Trček |
| |
Affiliation: | 1. Computer Science Dept., Harbin Engineering University, Harbin 150001, China;2. Automation Dept., Harbin Engineering University, Harbin 150001, China;3. Underwater Acoustic Engineering Dept., Harbin Engineering University, Harbin 150001, China;1. Department of Electrical Engineering University at Buffalo, The State University of New York, 230 Davis Hall, Buffalo, NY 14260, United States;2. Department of Electrical Engineering University at Buffalo, The State University of New York, 332, Bonner Hall, Buffalo, NY 14260, United States;1. Department of Environmental Sciences and Engineering, Fudan University, 220 Handan Road, Shanghai 200433, PR China;2. South China Institute of Environmental Sciences, Ministry of Environmental Protection, Guangzhou, PR China;3. Department of Geography, The University of Hong Kong, Hong Kong Special Administrative Region, PR China |
| |
Abstract: | Pervasive computing is already becoming a reality and one crucial consequence of this fact is endangered privacy. Now taking into account typical properties of pervasive computing devices, which are weak computing power and stringent energy or power consumption limitations, lightweight solutions are a must. This especially holds true for all-in-silicon objects like radio frequency identification tags, or RFIDs. Many solutions in this area are called lightweight, but being lightweight requires conformance to quantitative requirements using certain metrics. A solution that adheres to such requirements is a new privacy enabling protocol for RFIDs that outperforms other architecturally similar protocols, and this presents the first contribution of this paper. Further, privacy is not only a matter of technical solutions, but increasingly so a matter of organizational processes. This fact calls for further addressing of supporting its formal treatment in business contexts. This paper provides a basis for formal addressing of privacy from business processes perspective, and this is its second main contribution. |
| |
Keywords: | Wireless sensor networks RFID technology Security Privacy Lightweight protocols Security policies |
本文献已被 ScienceDirect 等数据库收录! |
|