dc.contributor.advisor | John R. Williams and Steven R. Lerman. | en_US |
dc.contributor.author | Mao, Tingting | en_US |
dc.contributor.other | Massachusetts Institute of Technology. Dept. of Civil and Environmental Engineering. | en_US |
dc.date.accessioned | 2009-10-01T15:37:19Z | |
dc.date.available | 2009-10-01T15:37:19Z | |
dc.date.copyright | 2008 | en_US |
dc.date.issued | 2008 | en_US |
dc.identifier.uri | http://hdl.handle.net/1721.1/47741 | |
dc.description | Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2008. | en_US |
dc.description | Includes bibliographical references (leaves 124-129). | en_US |
dc.description.abstract | It is estimated that over 3 billion Radio Frequency Identification (RFID) tags have been deployed through 2007. Most tags are used in supply chains where the Electronic Product Code (EPC) and associated business event data are transmitted through RFID networks. Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. Companies need to share these data with restricted business partners and, under some conditions, such as product recall, more widely with regulators and non business partners. At present, no security or privacy framework has been chosen as an EPCglobal standard(industry-driven standards for EPC) due to the difficulty of sharing information between parties who have no direct business relationships and hence no business rules for sharing these data. To date, no security schemes have been deployed that can support data exchange with multiple identity techniques and interchangeable complex business rules, as required by RFID networks. In this thesis, an Interoperable Internet-Scale Security (IISS) framework for RFID networks is proposed. The IISS framework performs authentication and authorization based on an aggregation of business rules, enterprise information, and RFID tag information. IISS provides a protocol for several authentication schemes and identity techniques. It also provides an engine for reasoning over business rules from different domains. Moreover, the IISS framework is able to resolve provenance information of RFID tags, which can identify the history of a particular piece of EPC data through the supply chain. | en_US |
dc.description.abstract | (cont.) The IISS framework and the IISS ontologies to model the information in RFID networks are also described, and how the IISS framework can be developed for access control in RFID enabled supply chains is discussed. Finally, the IISS framework's efficiency is tested using a supply chain EPC simulator as the testing platform, which allows optimization of the IISS protocol's performance. | en_US |
dc.description.statementofresponsibility | by Tingting Mao. | en_US |
dc.format.extent | 129 leaves | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Massachusetts Institute of Technology | en_US |
dc.rights | M.I.T. theses are protected by
copyright. They may be viewed from this source for any purpose, but
reproduction or distribution in any format is prohibited without written
permission. See provided URL for inquiries about permission. | en_US |
dc.rights.uri | http://dspace.mit.edu/handle/1721.1/7582 | en_US |
dc.subject | Civil and Environmental Engineering. | en_US |
dc.title | Interoperable internet-scale security framework for RFID networks | en_US |
dc.title.alternative | Interoperable internet-scale security framework for Radio Frequency Identification networks | en_US |
dc.type | Thesis | en_US |
dc.description.degree | Ph.D. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Civil and Environmental Engineering | |
dc.identifier.oclc | 428441629 | en_US |