The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network
Abstract
As RFID-enabled technology is becoming pervasive in enterprise systems and human life, it triggers significant concerns over the malware that can infect, damage, and even destroy RFID-enabled network systems. RFID malware can spread malicious codes or data quickly to a large number of RFID systems via RFID read and write, which are pervasive operations on RFID tags that are transported from one RFID system to another. To address this concern, this chapter uses RFID-enabled supply chain management systems in the EPCglobal network as a case study to demonstrate the important issues in RFID malware protection. This case study shows that although there are fundamental difficulties in preventing RFID malware from entering the systems, the behaviors of RFID malware resemble traditional malware after it enters the systems. Based on this characteristic, the security threats of RFID malware can be effectively controlled.
Related Content
Christopher Nyakotyo, Pedzisai Goronga.
© 2024.
18 pages.
|
Colleen Halupa.
© 2024.
23 pages.
|
Stefan Handke.
© 2024.
14 pages.
|
Jaime Santos-Reyes, Galdino Santos-Reyes, Ricardo Tejeida-Padilla.
© 2024.
19 pages.
|
Ahmad Kayaly.
© 2024.
20 pages.
|
Elizabeth Stroble.
© 2024.
15 pages.
|
Mubango Hazel, Hlanganipai Ngirande, Khathutshelo Khashane.
© 2024.
20 pages.
|
|
|