Scalability is frequently used as a magic incantation to indicate that something is badly designed or broken. Often you hear in a discussion "but that doesn't scale" as the magical word to end an argument. Werner Vogels CTO-Amazon.com Abstract The deployment of the RFID technology can put the privacy of its users in jeopardy. With the aim of averting the fears of the RFID potential users, a plethora of security and privacy methods have been designed. However, due to the important growth of this technology, scalability problems have arisen and the proper deployment of the technology has become a challenge. In this chapter, we provide a brief overview of the most relevant methods for providing security and privacy to the users of the RFID technology. We pay a special attention to the hash locks proposal and we recall a method based on the distribution of RFID readers, with the aim to provide security and privacy in a scalable fashion. In order to test our method, we have developed a simulator that is presented in this chapter. By using this simulator we study the distribution of several kinds of readers on a variety of scenarios, and we report some of the obtained results.
CITATION STYLE
Solanas, A., & Manjón, J. (2008). RFID Readers Deployment for Scalable Identification of Private Tags. In RFID Security (pp. 289–314). Springer US. https://doi.org/10.1007/978-0-387-76481-8_12
Mendeley helps you to discover research relevant for your work.