Security Framework for RFID-based Applications in Smart Home Environment |
Konidala, Divyan M.
(Dept. of Information and Communications Engineering, Korea Advanced Institute of Science and Technology (KAIST))
Kim, Dae-Young (Department of Computer Science, KAIST) Yeun, Chan-Yeob (Computer Engineering (Sharjah Campus), Khalifa University of Science, Technology & Research (KUSTAR)) Lee, Byoung-Cheon (Dept. of Information Security, Joongbu University) |
1 | EPCglobal Inc., http://www.EPCglobalinc.org |
2 | EPCglobal Ratified Specification, “The EPCglobal Architecture Framework,” 2009. http://www.epcglobalinc.org/standards/ |
3 | EPCglobal Ratified Standard, “EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz - 960MHz Version 1.2.0,” 2008. http://www.epcglobalinc.org/standards/ |
4 | Impinj RFID Technology Series Whitepaper, “UHF Gen 2 for Item-Level Tagging,” REV 1.0 02-06, February 2006, http://www.impinj.com/files/MR_GP_ED_00003_ILT.pdf |
5 | Internet Engineering Task Force (IETF), Network Working Group, and E. Rescorla, “HTTP Over TLS,” RFC2818, http://tools.ietf.org/html/rfc2818, 2000. |
6 | VeriSign, The EPCglobal Network: Enhancing the Supply Chain, White Paper 2005, http://www.verisign.com/stellent/groups/public/documents/white_paper/002109.pdf |
7 | ISO/IEC 18092, “Near Field Communication Interface and Protocol (NFCIP-1),” http://www.iso.org/iso/catalogue_detail.htm?csnumber=38578 |
8 | Juels, A. (2005), RFID Security and Privacy: A Research Survey, RSA Laboratories. |
9 | Klaus, F., RFID Handbook - Fundamentals and Applications in Contactless Smart Cards and Identification,, 2nd Edition, John Wiley & Sons, 2003, ISBN-13: 978-0470844021. |