Information Security Study on Innovative Power Meter System

Article Preview

Abstract:

This study investigates the RFID based innovative power meter system. The system architecture and business process are improved by adopting standard complied design approach. Open Standards contributes more flexibility, more interoperability, less time consuming to our innovative system developing and play a key role for well emerging and running into global ICT infrastructures. Then a protocol framework to address security issue is provided and it make password based authentication scheme workable to enhance the security strength. RSA based digital signature methods are introduced to achieves a two-way authentication from tag to reader. Proposed protocol framework suits for power meter practical service process and offers potential to upgrade the cryptography methods for future hardware progress. It could be used as the foundation for inducing advanced technique while inspecting the information security requirements need. Our study is helpful for future power resource management system deploying and it is also valuable to address the security problem for mobile reader like RFID innovation system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1057-1061

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M.Y. Wu, C. K. Ke, W. L. Tzeng, Applying Context-Aware RBAC to RFID Security Management for Application in Retail Business. Proceeding of IEEE Asia-Pacific Conference on Service Computing. (2008) 1208-1212.

DOI: 10.1109/apscc.2008.25

Google Scholar

[2] S. Y. Chan, S. W. Luan, J. H. Teng, M. C. Tsai, Design and implementation of a RFID-based power meter and outage recording system. Proceeding of IEEE International Conference on Sustainable Energy Technologies. (2008) 750-754.

DOI: 10.1109/icset.2008.4747106

Google Scholar

[3] F.T. Wang, T.D. Wu and T.Y. Chang, Information Security Controls on RFID Based Power Meter System. Proceeding of International Security Technology and Management Conference. (2010).

Google Scholar

[4] F.T. Wang and T.D. Wu, Information Security Study on RFID Based Power Meter System. Proceding of IEEE International Conference on Information Management and Engineering. (2010) 317-320.

DOI: 10.1109/icime.2010.5477885

Google Scholar

[5] F.T. Wang, T.D. Wu and T.Y. Chang, Applying HMAC to enhance information security for mobile reader RFID system. Communications in Computer and Information Science. (2011) 568-573.

DOI: 10.1007/978-3-642-23321-0_89

Google Scholar

[6] C. E. Larsen, R. Trip, and C.R. Johnson, Security Standards for the RFID Market. in IEEE SECURITY & PRIVACY (2005).

Google Scholar

[7] J. Friedrich, Making Innovation Happen: The Role of Standards and Openness in An Innovation Friendly Ecosystem (2009).

DOI: 10.1109/siit.2011.6083609

Google Scholar

[8] K. Crooker, D. Baldwin, S. Chalasani, RFID Technology as Sustaining or Disruptive Innovation: Applications in the Healthcare Industry. European Journal of Scientific Research. (2009) 160-178.

Google Scholar

[9] C. Jin, Collaborative Commerce (CPC) Innovation Platform System Design in a Virtual Garment Enterprise, Proceeding of International Conference on System Science, Engineering Design and Manufacturing informatization. (2010) 250-253.

DOI: 10.1109/icsem.2010.155

Google Scholar

[10] T. Karygiannis, B. Eydt, G. Barber, L. Bunn, T. Phillips, Guidelines for Security Radio Frequency Identification (RFID) Systems. NIST: Special Publication 800-98. (2007).

DOI: 10.6028/nist.sp.800-98

Google Scholar

[11] E. Maiwald, Nectwork Security- A beginner's Guide. The McGraw-Hill Companies, New York, (2003).

Google Scholar

[12] G. Bao, M. Zhang, J. Liu, Y. Li, The Design of an RFID Security Protocol based on RSA Signature for E-ticket. (2010).

Google Scholar

[13] J. Ayoade, Security implications in RFID and authentication processing framework. Computers & Security. (2006) 207-212.

DOI: 10.1016/j.cose.2005.11.008

Google Scholar