Next Article in Journal
Collaborative Processing of Wearable and Ambient Sensor System for Blood Pressure Monitoring
Previous Article in Journal
Use of Sensor Imagery Data for Surface Boundary Conditions in Regional Climate Modeling
Open AccessArticle

Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

by Wan Tang 1, Min Chen 2,3,*, Jin Ni 4 and Ximin Yang 1,*
1
Computer Intelligence Lab, College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China
2
School of Computer Science and Engineering, Seoul National University, Seoul 151-742, Korea
3
School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
4
School of Physics and Electronics, Henan University, Kaifeng 475004, China
*
Authors to whom correspondence should be addressed.
Sensors 2011, 11(7), 6743-6759; https://doi.org/10.3390/s110706743
Received: 8 May 2011 / Revised: 14 June 2011 / Accepted: 23 June 2011 / Published: 28 June 2011
(This article belongs to the Section Physical Sensors)
The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system. View Full-Text
Keywords: radio frequency identification (RFID); context-aware computing; role-basedaccess control (RBAC); mobile code radio frequency identification (RFID); context-aware computing; role-basedaccess control (RBAC); mobile code
Show Figures

Graphical abstract

MDPI and ACS Style

Tang, W.; Chen, M.; Ni, J.; Yang, X. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems. Sensors 2011, 11, 6743-6759.

Show more citation formats Show less citations formats

Article Access Map by Country/Region

1
Only visits after 24 November 2015 are recorded.
Back to TopTop