ETSI TR 187 020-2011 Radio Frequency Identification (RFID) Coordinated ESO response to Phase 1 of EU Mandate M436 (V1 1 1)《无线电频率识别(RFID) 协调ESO对EU授权M436第1阶段的相应(版本1 1 1)》.pdf
《ETSI TR 187 020-2011 Radio Frequency Identification (RFID) Coordinated ESO response to Phase 1 of EU Mandate M436 (V1 1 1)《无线电频率识别(RFID) 协调ESO对EU授权M436第1阶段的相应(版本1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI TR 187 020-2011 Radio Frequency Identification (RFID) Coordinated ESO response to Phase 1 of EU Mandate M436 (V1 1 1)《无线电频率识别(RFID) 协调ESO对EU授权M436第1阶段的相应(版本1 1 1)》.pdf(93页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 187 020 V1.1.1 (2011-05)Technical Report Radio Frequency Identification (RFID);Coordinated ESO response to Phase 1 of EU Mandate M436ETSI ETSI TR 187 020 V1.1.1 (2011-05) 2Reference DTR/TISPAN-07044 Keywords privacy, RFID, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex
2、- FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document
3、may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF v
4、ersion kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.a
5、sp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to
6、 reproduction in all media. European Telecommunications Standards Institute 2011. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM, TIPHONTM, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit
7、 of its Members and of the 3GPP Organizational Partners. LTE is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 187 020 V1.1.1 (2011-
8、05) 3Contents Intellectual Property Rights 6g3Foreword . 6g31 Scope 7g32 References 7g32.1 Normative references . 8g32.2 Informative references 8g33 Definitions and abbreviations . 11g33.1 Definitions 11g33.2 Abbreviations . 13g34 Summary of findings and recommendations 13g34.1 Overview of findings
9、13g34.2 Clarification of definition of RFID . 14g34.3 Summary of standardisation gaps . 15g34.3.1 General principles . 15g34.3.2 Standards to provide greater consumer awareness 15g34.3.3 Standards in the privacy domain (excluding PIA) 15g34.3.4 PIA standards 16g34.3.5 RFID Penetration testing standa
10、rds 16g34.3.6 Standards in the security domain 16g34.4 Gaps in current standards . 17g34.4.1 Overview 17g34.4.1.1 Summary of main gaps 18g34.4.2 Gantt chart for addressing gaps in Phase 2 of M/436 . 18g35 Addressing consumer aspects . 21g35.1 Awareness 21g35.2 Personal data security . 21g35.3 Data P
11、rotection Requirements 22g35.3.1 Purpose . 22g35.3.2 Deactivation 22g35.3.3 Consent . 22g35.3.4 Personal data record access and data correction . 23g35.4 Accessibility of applications and consumer information 23g36 The RFID ecosystem 23g36.1 Overview 23g36.2 Types of RFID Tags . 24g36.3 RFID Tag Cha
12、racteristics . 24g36.4 Stakeholders . 25g36.5 Open and closed system applications . 25g36.6 RFID and IoT . 26g37 Analysis in support of recommendations . 26g37.1 RFID system architecture . 26g37.2 RFID system and privacy . 27g37.2.1 Modelling the role of RFID in privacy . 28g37.3 Principles for hand
13、ling personal data in RFID systems 31g37.4 Role of Privacy Enhancing Technologies (PETs) 35g38 Data Protection, Privacy and Security Objectives and Requirements 36g38.1 Distinguishing objectives and requirements . 36g38.2 Data protection and privacy objectives 36g38.3 Statement of objectives for Sec
14、urity . 38g39 Privacy and Data Protection Impact Assessment (PIA) outline . 39g39.1 State of the art and standardization gaps 39g3ETSI ETSI TR 187 020 V1.1.1 (2011-05) 49.2 Role of the PIA . 40g39.3 Overview of RFID-related features with an impact on privacy 41g39.4 RFID PIA Framework 42g39.5 PIA Me
15、thodology Requirements 42g39.5.1 Assets and the RFID PIA 43g39.5.2 Scope of the PIA . 43g39.5.3 General methodological requirements 44g39.5.4 Data Protection and Privacy requirements of the RFID PIA 44g39.5.4.1 Data protection requirements 44g39.5.4.2 Data protection requirements 45g39.5.4.3 Emergin
16、g issues and requirements related to emerging or future applications, technologies, and other issues 46g310 RFID Penetration (PEN) Testing Outline. 46g310.1 PEN testing standards and methodologies 47g310.2 RFID PEN testing standardization roadmap 48g310.3 PEN testing requirements and method outline
17、. 48g311 Common European RFID Emblem and Sign . 49g312 Environmental aspects of RFID tags and components . 49g312.1 Health and safety considerations 49g312.2 RFID hardware end of life considerations 50g312.3 Data end of life considerations . 50g3Annex A: Summary of status of RFID standardization . 5
18、1g3Annex B: Summary of tag capabilities . 53g3B.1 Command set 53g3B.2 Security functionality . 53g3B.2.1 Tag embedded capabilities . 53g3Annex C: Summary of risk assessment of RFID systems . 56g3C.1 Security analysis and requirements derivation . 56g3C.2 Weaknesses and threats in RFID systems 57g3C.
19、2.1 Privacy and Data Protection (DPP) related threats . 58g3C.2.1.1 Identify theft . 58g3C.2.1.2 Profiling 58g3C.2.1.3 Data linkability . 58g3C.2.1.4 Tracking 58g3C.2.1.5 Exclusion of the data subject from the data processing process due to disabling of RFID tag . 58g3C.2.1.6 Procedures/instructions
20、 not followed leading to tags being used past end of purpose 58g3C.2.1.7 Large-scale and/or inappropriate data mining and/or surveillance . 58g3C.2.1.8 Non-compliance with data protection legislation . 59g3C.2.2 Security threats . 59g3C.2.2.1 Denial-of-Service attack . 59g3C.2.2.2 Collision attack .
21、 59g3C.2.2.3 De-synchronization . 59g3C.2.2.4 Replay . 59g3C.2.2.5 Man-in-the-middle attack . 59g3C.2.2.6 Theft 60g3C.2.2.7 Unauthorised access to/deletion/modification of data (in tags, interrogators, backend system) . 60g3C.2.2.8 Cloning of credentials and tags (RFID related) 60g3C.2.2.9 Worms, vi
22、ruses and malicious code 60g3C.2.2.10 Side channel attack . 60g3C.2.2.11 Masquerade . 61g3C.2.2.12 Traffic analysis/scan/probe . 61g3C.2.2.13 RF eavesdropping . 61g3C.3 Summary of vulnerabilities in RFID systems 61g3ETSI ETSI TR 187 020 V1.1.1 (2011-05) 5Annex D: RFID Penetration Testing 63g3D.1 Sho
23、rt Introduction to PEN testing 63g3D.2 PEN testing methodologies and standards . 63g3Annex E: Summary of requirements and analysis for signs and emblems . 65g3E.1 Requirements specification 65g3E.2 RFID Emblem/Logo classified requirements . 65g3E.2.1 General Requirements Specification 65g3E.2.2 Loca
24、tion and Placement . 70g3E.2.3 Other Requirements 72g3E.3 RFID Sign classified requirements . 72g3E.3.1 General Requirements Specification 72g3E.3.2 Location and Placement . 75g3E.3.3 Other Requirements 76g3Annex F: Review of security analysis issues in PIA 77g3Annex G: Bibliography 82g3G.1 Books 82
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1870202011RADIOFREQUENCYIDENTIFICATIONRFIDCOORDINATEDESORESPONSETOPHASE1OFEUMANDATEM436V111 无线电

链接地址:http://www.mydoc123.com/p-737309.html