PD CEN/TR 16670:2014 - Information technology. RFID threat and vulnerability analysis

PD CEN/TR 16670:2014

Information technology. RFID threat and vulnerability analysis

Status : Current   Published : June 2014

Format
PDF

Format
HARDCOPY



The scope of the Technical Report is to consider the threats and vulnerabilities associated with specific characteristics of RFID technology in a system comprising: — the air interface protocol covering all the common frequencies; — the tag including model variants within a technology; — the interrogator features for processing the air interface; — the interrogator interface to the application. The Technical Report addresses specific RFID technologies as defined by their air interface specifications. The threats, vulnerabilities, and mitigating methods are presented as a toolkit, enabling the specific characteristics of the RFID technology being used in an application to be taken into consideration. While the focus is on specifications that are standardized, the feature analysis can also be applied to proprietary RFID technologies. This should be possible because some features are common to more than one standardized technology, and it should be possible to map these to proprietary technologies. Although this Technical Report may be used by any operator, even for a small system, the technical details are better considered by others. In particular the document should be a tool used by RFID system integrators, to improve security aspects using a privacy by design approach. As such it is also highly relevant to operators that are not SME’s, and to industry bodies representing SME members. Although this Technical Report may be used by any operator, even for a small system, the technical details are better considered by others. In particular the document should be a tool used by RFID system integrators, to improve security aspects using a privacy by design approach. As such it is also highly relevant to operators that are not SME’s, and to industry bodies representing SME members.




Standard NumberPD CEN/TR 16670:2014
TitleInformation technology. RFID threat and vulnerability analysis
StatusCurrent
Publication Date30 June 2014
Normative References(Required to achieve compliance to this standard)No other standards are normatively referenced
Informative References(Provided for Information)ISO/IEC 18000-1, ISO/IEC 18000-2, ISO/IEC 18000-3, ISO/IEC 18000-4, ISO/IEC 18000-6, ISO/IEC 18000-61, ISO/IEC 18000-62, ISO/IEC 18000-63, ISO/IEC 18000-64, ISO/IEC 18000-7, ISO/IEC 18046-1, ETSI/TR 101543 v1.1.1:2011
International RelationshipsCEN/TR 16670:2014
DescriptorsData processing, Analysis, Radiofrequencies, Tags (data processing), Interfaces (data processing), Crime
ICS35.240.60
Title in FrenchTechnologies de l'information. RFID, analyse vulnérabilité et de menace
Title in GermanInformationstechnik. Analyse zur Bedrohung und Verletzlichkeit durch beziehungsweise von RFID
CommitteeIST/34
ISBN978 0 580 83895 8
PublisherBSI
FormatA4
DeliveryYes
Pages74
File Size4.722 MB
Price£274.00


 Your basket
Your basket is empty

Multi-user access to over 3,500 medical device standards, regulations, expert commentaries and other documents


Develop a PAS

Develop a fast-track standardization document in 9-12 months


BSOL

The faster, easier way to work with standards


Tracked Changes

Understand the changes made to a standard with our new Tracked Changes version