23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 2.15: <strong>RFID</strong> Bus<strong>in</strong>ess System Security Risks (author)<br />

However, the Bus<strong>in</strong>ess Information System (BIS) consists of the<br />

database/warehouse application, the human participants, the Information System<br />

(IS) build, and the Information Technology (IT) that supports the IS. As a sub-<br />

system of the BIS, middleware is found on the scanners and <strong>in</strong> the POS entity.<br />

The explanation given by other researchers (Bhargava, 2006) suggests that the<br />

division of the BIS is categorized <strong>in</strong>to layers such as the real world (strategic<br />

layer), the software (application layer), the protocols (the transport layer) and the<br />

<strong>Tag</strong>s (the physical layer). Such a categorization maps onto the archive of known<br />

security breaches <strong>in</strong> the Internet world and provides structure for security risk<br />

assessment of BIS entity.<br />

2.6 CONCLUSION<br />

In this chapter, the three-tier model of a <strong>RFID</strong> system such as material layer<br />

(Section 2.1), IS layer (Section 2.2) and bus<strong>in</strong>ess process layer (Section 2.3) were<br />

reviewed <strong>in</strong> order to understand and identify the processes, model, and concepts<br />

that could be applied to the proposed research. As stated <strong>in</strong> the material layer, the<br />

characteristics of different classes of <strong>RFID</strong> <strong>Tag</strong>s, readers, host or controller, <strong>RFID</strong><br />

standards were reviewed. Likewise, the review of the IS layer expla<strong>in</strong>ed where the<br />

data was stored and the way <strong>in</strong> which the tag data was transferred to the backend<br />

servers or enterprise applications. Moreover, the BS of a <strong>RFID</strong> stock management<br />

34

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!