Next Article in Journal
Collaborative Processing of Wearable and Ambient Sensor System for Blood Pressure Monitoring
Previous Article in Journal
Use of Sensor Imagery Data for Surface Boundary Conditions in Regional Climate Modeling
Article Menu

Export Article

Open AccessArticle
Sensors 2011, 11(7), 6743-6759; doi:10.3390/s110706743

Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

1
,
2,3,* , 4
and
1,*
1
Computer Intelligence Lab, College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China
2
School of Computer Science and Engineering, Seoul National University, Seoul 151-742, Korea
3
School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
4
School of Physics and Electronics, Henan University, Kaifeng 475004, China
*
Authors to whom correspondence should be addressed.
Received: 8 May 2011 / Revised: 14 June 2011 / Accepted: 23 June 2011 / Published: 28 June 2011
(This article belongs to the Section Physical Sensors)
View Full-Text   |   Download PDF [322 KB, uploaded 21 June 2014]   |  

Abstract

The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system. View Full-Text
Keywords: radio frequency identification (RFID); context-aware computing; role-basedaccess control (RBAC); mobile code radio frequency identification (RFID); context-aware computing; role-basedaccess control (RBAC); mobile code
Figures

This is an open access article distributed under the Creative Commons Attribution License (CC BY 3.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Tang, W.; Chen, M.; Ni, J.; Yang, X. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems. Sensors 2011, 11, 6743-6759.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top