DocumentCode :
244786
Title :
Gen2v2-Security-and-Privacy-Features-Leveraged Application Designs
Author :
Teng Yu Huang ; Hung-Yu Chien
Author_Institution :
Dept. of Inf. Manage., Nat. Chi-Nan Univ. Taiwan, Puli, Taiwan
fYear :
2014
fDate :
3-5 Sept. 2014
Firstpage :
141
Lastpage :
147
Abstract :
EPC Class 1 Gen2 (usually called Gen2 for short, and will be called Gen2v1 in this paper) released by EPCglobal was designed for logistics applications. However, due to its high reading speed, large reading volume and longer reading distance have made Gen2v1 one of the most popular tag and it has been widely used in other applications like identity identification, tickets, asset management and medical applications. These applications also highlighted the inadequacies of original Gen2v1´s specifications-functionality, security and privacy protection. Therefore, in 2013 November, EPCglobal released the new Gen2 specification-Gen2 version2 (Gen2v2) - to meet various requirements like security, File-management and privacy protections. Gen2v2 new features include a new security architecture, commands to facilitate the design of security and privacy protection as well as new File-management and access privilege. However, due to the new architecture is very flexible, powerful and complex. Both the academia and the industry are currently unfamiliar with the specifications and unable to leverage the features to design promising applications. This paper, therefore, pioneers in exploring the new features of Gen2v2, and proposes reference designs for several classic applications. We hope these reference designs could facilitate future research and development.
Keywords :
data privacy; formal specification; identification technology; security of data; storage management; EPC Class 1 Gen2; EPCglobal; Gen2 specification; Gen2v2-security-and-privacy-features-leveraged application design; access privilege; asset management; file management; identity identification; logistics application; medical applications; memory managament; privacy protection; reading distance; reading speed; reading volume; security architecture; security protection; security requirements; tag; tickets; Communities; Drugs; Libraries; Memory management; Privacy; Receivers; Security; Gen2; RFID; authentication; privacy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security (ASIA JCIS), 2014 Ninth Asia Joint Conference on
Conference_Location :
Wuhan
Type :
conf
DOI :
10.1109/AsiaJCIS.2014.31
Filename :
7023252
Link To Document :
بازگشت