DPS
Drejtoria e Përgjithshme e Standardizimit
Phone: +355 4 222 62 55
E-mail: info@dps.gov.al
Address: Address: "Reshit Collaku" Str., (nearby ILDKPKI, VI floor), Po.Box 98, Tiranë - Albania
Main menu

DS CEN/TR 16670:2014

Information technology - RFID threat and vulnerability analysis

Nov 26, 2014

General information

60.60     Nov 26, 2014

DPS

DPS/KT 224

Technical Report

35.240.60  

English  

Buying

Published

Language in which you want to receive the document.

Scope

The scope of the Technical Report is to consider the threats and vulnerabilities associated with specific characteristics of RFID technology in a system comprising:
— the air interface protocol covering all the common frequencies;
— the tag including model variants within a technology;
— the interrogator features for processing the air interface;
— the interrogator interface to the application.
The Technical Report addresses specific RFID technologies as defined by their air interface specifications. The threats, vulnerabilities, and mitigating methods are presented as a toolkit, enabling the specific characteristics of the RFID technology being used in an application to be taken into consideration. While the focus is on specifications that are standardized, the feature analysis can also be applied to proprietary RFID technologies. This should be possible because some features are common to more than one standardized technology, and it should be possible to map these to proprietary technologies.
Although this Technical Report may be used by any operator, even for a small system, the technical details are better considered by others. In particular the document should be a tool used by RFID system integrators, to improve security aspects using a privacy by design approach. As such it is also highly relevant to operators that are not SME’s, and to industry bodies representing SME members.

Although this Technical Report may be used by any operator, even for a small system, the technical details are better considered by others. In particular the document should be a tool used by RFID system integrators, to improve security aspects using a privacy by design approach. As such it is also highly relevant to operators that are not SME’s, and to industry bodies representing SME members.

Life cycle

NOW

PUBLISHED
DS CEN/TR 16670:2014
60.60 Standard published
Nov 26, 2014

Related project

Adopted from CEN/TR 16670:2014

Preview

Only informative sections of projects are publicly available. To view the full content, you will need to members of the committee. If you are a member, please log in to your account by clicking on the "Log in" button.

Login