30 likes | 184 Views
Secure integration of RFID & BSN in Personal Networks. RFID as additional sensing source : item presence and relevant metadata Benefits : reach more personal items, on-item history log, secure management of personal data, user authentication in context…
E N D
Secure integration of RFID & BSN in Personal Networks • RFID as additional sensing source: item presence and relevant metadata • Benefits: reach more personal items, on-item history log, secure management of personal data, user authentication in context… • Secure access to RFID-enabled personal objects and documentation from PN members and remote PNs and service providers • Integration of RFID technology and BSNs at physical and logic levels
Secure software architecture for personal networks • PN architecture support local and remote access to resource-constrained tags • RFID-enabled objects registered as PN members. • Authentication and authorization of requesting entities • Secure management of context data. Filtering and anonymization • Establishment of secure tunnel between external entities and restricted nodes. Proxy and gateway nodes
Management of RFID & sensor nodes in the PN architecture • Incorporation of RFID nodes in PN: selection of authentication protocols, management of heterogeneous cryptographic materials, adoption of tags from external sources • Adaptation of RFID tag ownership transfer schemes for PNs and tag ownership sharing • Access to context-aware technologies in PN: direct access vs aggregated knowledge • Low level communication with final entities. Reduced granularity control • Decoupling queries from actual access to nodes. Fine-grained filtering of sensitive data • Alternatives in secure direct access to RFID nodes • Proxy nodes as command forwarders vs command gateways • Management of RFID tag authentication credentials for remote nodes • Enforcement of privacy policies in the access to personal tags