12.07.2015 Views

CCSDS 881.0-R-1, Spacecraft Onboard Interface Services—RFID ...

CCSDS 881.0-R-1, Spacecraft Onboard Interface Services—RFID ...

CCSDS 881.0-R-1, Spacecraft Onboard Interface Services—RFID ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DRAFT RECOMMENDED PRACTICE FOR RFID-BASED INVENTORY MANAGEMENT SYSTEMSAdversarial threats, whether to business process or business intelligence, are more likely tooccur on the ground than on the vehicle. Possibilities of damage, both intentional andaccidental, to tagged items during transport should be considered. Adversaries seekingpublicity or action against a government or agency might try to kill or reprogram tags. Tagcommands issued by airport or shipping crews could likewise impact item tags withoutintent. Adversarial threats could also occur with the downlink of tag data in spacecrafttelemetry if the link is not properly secured, or if unencrypted data is disseminated beyondthe authorized receivers.C2.4 PRIVACY RISKPrivacy risks pertain to information gleaned from tags that are in some way associated withan individual. For example, information might be read from a tagged prescription bottle thatreveals a medical condition associated with the carrier. Consequences can be legal action forviolation of privacy laws or a consumer or constituent backlash when it is perceived that atrust is breached, even when no laws were broken. Typically, personal information issegregated as ‘personally identifiable’ or ‘non-personally identifiable’ according to whetherthe subject information is sufficient to designate or contact a specific individual. Laws inmany countries regulate how personally identifiable information is managed. The type ofdata stored on the tags is again a major factor in the level of risk.For applications served by this document, it is likely that the privacy risks are largely orwholly oriented to the crew. Care must be exercised to ensure that RFID data associatedwith specific crewmembers is available only to individuals authorized to receive that data.For example, tagged medical samples are likely to be subject to laws protecting privacy. Aswith business process and business intelligence, privacy must be safeguarded when certainRFID data is downlinked or disseminated, or when returned science sample tags carry datasubject to privacy laws.C2.5 EXTERNALITY RISKExternality risks describe the inadvertent undesirable effects of an RFID system on othersystems. The main externality risk for the RF subsystem is hazards resulting fromelectromagnetic radiation, which could range from adverse health effects to ignition of acombustible material (reference [D10]). The reader is referred to 3.2.2‘Restrictions/Hazards’. Commercial RFID tags often are manufactured from low-costmaterials and rely on low-cost adhesives in order for viability of the technology. Outgassingof these materials constitutes an externality risk relevant to confines with closed-loopventilation, such as spacecraft.C3RFID SECURITY CONTROLSThis subsection describes security controls to mitigate risks described above. As in thepreceding subsection, treatment pertains to the RFID subsystem, and security controls<strong>CCSDS</strong> <strong>881.0</strong>-R-1 Page C-3 October 2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!