Skip to main content

Security in EPCglobal Networks

  • Chapter
  • First Online:
Real-time Security Extensions for EPCglobal Networks

Part of the book series: In-Memory Data Management Research ((IMDM))

Abstract

After the analysis and classification of related work, I deal with specific security requirements for RFID environments in the following. I focus on why business relationships in global supply chains need to be analyzed in detail with respect to security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Office of Transportation and Machinery U.S. Department of Commerce. U.S. Automotive Parts Industry Annual Assessment (2011), http://trade.gov/wcm/groups/public/@trade/@mas/@man/@aai/documents/web_content/auto_reports_parts2009.pdf. Accessed 8 Mar 2012

  2. International Organization for Standardization. ISO/IEC 9001:2008—Quality Management Systems—Requirements, (2008)

    Google Scholar 

  3. International Organization for Standardization. Expected outcomes for accredited certification to ISO 9001 (2011), http://www.iso.org/iso/definitive_expected_outcomes_iso9001.pdf. Accessed 8 Mar 2012

  4. Federal Office for Information Security. BSI Standard 100–1: Information Security Management, System V.1.5 (2008)

    Google Scholar 

  5. International Organization for Standardization. ISO/IEC 27001:2005—Information Technology—Security Techniques—Information Security Management Systems–Requirements (2005)

    Google Scholar 

  6. S. Wendt, Nichtphysikalische Grundlagen der Informationstechnik: Interpretierte Formalismen, Vol 2 ( Springer, Berlin, 1991)

    Google Scholar 

  7. M. Stamp, Information Security: Principles and Practice. (John Wiley and Sons, New York, 2006)

    Google Scholar 

  8. Federal Office for Information Security. BSI Standard 100–3: Risk Analysis based on IT-Grundschutz V. 2.5 (2008)

    Google Scholar 

  9. Simson L. Garfinkel, Ari Juels, Ravi Pappu, RFID privacy: an overview of problems and proposed solutions. IEEE Secur. Priv. 3, 34–43 (2005)

    Google Scholar 

  10. Global Standards 1. Tag Data Standards 1.6 (2011), http://www.gs1.org/gsmp/kc/epcglobal/tds/tds_1_6-RatifiedStd-20110922.pdf. Accessed 8 Mar 2012

  11. M-P. Schapranow, A. Zeier, F. Leupold, T. Schubotz, Securing EPCglobal Object Name Service—Privacy Enhancements for Anti-counterfeiting. In Proceedings of the 2nd International Conference on Intelligent Systems, Modeling and Simulation. IEEE Computer Society, (2011), pp. 332–337

    Google Scholar 

  12. M-P. Schapranow, A. Zeier, H. Plattner, A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access. In Proceedings of the 4th International Conference on Network and System Security, (2010)

    Google Scholar 

  13. K. Koscher et al., EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond. Manuscript (2008)

    Google Scholar 

  14. H. Hwang et al., A Study on MITM Vulnerability in Wireless Network Using 802.1X and EAP. In Proceedings of the International Conference on Information Science and Security, Washington, DC, USA, IEEE Computer Society, (2008), pp. 164–170

    Google Scholar 

  15. Global Standards 1. EPC Radio-Frequency Identity Protocols - Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz - 1.2.0 (2008), http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf. Accessed 8 Mar 2012

  16. Hossein Bidgoli, Handbook of Information Security (John Wiley and Sons, Inc., New York, 2006)

    Google Scholar 

  17. Bayer Technology Services. Sicher, schnell & einfach - Einmalige Zufallszahlen mit dem BayCoder (2011), http://www.bayertechnology.com/uploads/media/Infoblatt_TTA_BayCoder_D_030811.pdf. Accessed 8 Mar 2012

  18. J.M. Stewart, E. Tittel, M. Chapple, Certified Information Systems Security Professional Study Guide, 3rd edn. (Sybex, New York, 2005)

    Google Scholar 

  19. D. Russell, G.T. Gangemi, Sr. Computer Security Basics (O’Reilly & Associates Inc., Sebastopol, 1991)

    Google Scholar 

  20. A. Juels, Minimalist Cryptography for Low-Cost RFID Tags, eds. by C. Blundo, S. Cimato Security in Communication Networks. Lecture Notes in Computer Science, Vol 3352 (Springer, Berlin , 2005), pp. 149–164

    Google Scholar 

  21. M. Beck, E. Tews, Practical Attacks against WEP and WPA (2008), http://dl.aircrack-ng.org/breakingwepandwpa.pdf. Accessed 8 Mar 2012

  22. W. Stallings, Cryptography and Network Security, 4th edn. (Prentice Hall, New Delh, 2005)

    Google Scholar 

  23. U. Waldmann, U. Waldmann, K. Sohr, RFID-Studie 2007: Technologieintegrierte Datensicherheit bei RFID-Systemen (Studie, Fraunhofer-Institut für Sichere Informations-Technologie (SIT), Darmstadt, 2007)

    Google Scholar 

  24. I. Sommerville, Software Engineering. (Addison-Wesley, New York, 2007)

    Google Scholar 

  25. Supply Chain Council. Supply Chain Operations Reference Model V.10. Whitepaper (2010)

    Google Scholar 

  26. M-P. Schapranow et al., What are Authentic Pharmaceuticals Worth?, chapter 13 (INTECH Press, New York, 2011), pp. 203–220

    Google Scholar 

  27. L. Vilkov, B. Weiß, Prozessorientierte Wirtschaftlichkeitsanalyse von RFID-Systemen anhand eines Referenz-Wirkungsmodells (Springer, Heidelberg, 2008), pp. 275–304

    Google Scholar 

  28. G.F. Knolmayer, P. Mertens, A. Zeier, Supply Chain Management Based on SAP Systems: Architecture and Planning Processes SAP Excellence (Springer, Berlin, 2009)

    Google Scholar 

  29. J. Müller et al., RFID Middleware as a Service—Enabling Small and Medium-sized Enterprises to Participate in the EPC Network. In Proceedings of the 16th International Conference on Industry Engineering and Engineering Management, Vol 2 (2009), pp. 2040–2043

    Google Scholar 

  30. T.R. Henderson et al., Network Simulations with the ns-3 Simulator. Computer Engineering (2006), pp. 173-182

    Google Scholar 

  31. M-P. Schapranow, A. Zeier, H. Plattner, A Formal Model for Enabling RFID in Pharmaceutical Supply Chains. In Proceedings of the 44th Hawaii International Conference on System Sciences (2011)

    Google Scholar 

  32. E. Gamma, Design Patterns: Elements of Reusable Object-oriented Software (Addison-Wesley, London, 1995)

    Google Scholar 

  33. M-P. Schapranow, C. Faehnrich, A. Zeier, H. Plattner, Simulation of RFID-aided Supply Chains: Case Study of the Pharmaceutical Industry. In Proceedings of the 3rd International Conference on Computational Intelligence, Modelling and, Simulation, (2011)

    Google Scholar 

  34. A. Juels, R.L. Rivest, M. Szydlo, The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In Proceedings of the 10th Conference on Computer and Communication Security, New York, NY, USA, (2003), pp. 103–111

    Google Scholar 

  35. M-P. Schapranow, Transaction Processing 2.0: The Epochal Change in Designing Transaction Processing Systems. Master’s thesis, Hasso Plattner Institute (2008)

    Google Scholar 

  36. H. Plattner, A. Zeier, In-Memory Data Management: An Inflection Point for Enterprise Applications (Springer, Berlin, 2011)

    Google Scholar 

  37. P. Svensson, The Evolution of Vertical Database Architectures—A Historical Review. In Proceedings of the 20th International Conference on Scientific and Statistical Database Management (Springer, New York, 2008), pp. 3–5

    Google Scholar 

  38. S. Lightstone, T.J. Teorey, T. Nadeau, Physical Database Design: The Database Professional’s Guide to Exploiting Indexes, Views, Storage, and more (Elsevier, New York, 2007)

    Google Scholar 

  39. J.M. Hellerstein, M. Stonebraker, J. Hamilton, Architecture of a Database System, Foundation and Trends in Databases, Vol 1 (Now Publishers, New York, 2007)

    Google Scholar 

  40. S. Andrew, Tanenbaum Modern Operating Systems, 3rd edn. (Prentice Hall Press, Paramus, 2008)

    Google Scholar 

  41. J.M. Hellerstein, M. Stonebraker, Readings in Database Systems, 4th edn. (MIT Press, New York, 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthieu-P Schapranow .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schapranow, MP. (2014). Security in EPCglobal Networks. In: Real-time Security Extensions for EPCglobal Networks. In-Memory Data Management Research. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36343-6_3

Download citation

Publish with us

Policies and ethics