Font Size: a A A

Research On Security Decision-Making Technology Of RFID Middleware Based On Context-Aware Computing

Posted on:2010-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y J LiaoFull Text:PDF
GTID:2178360275470019Subject:Software engineering
Abstract/Summary:PDF Full Text Request
RFID technique is widely used in context-aware applications such as intelligent office, smart home, travelling and future shop. Through collecting and analyzing user's context information, they can provide efficient interaction way with user and specialized personal services. At the same time, it has brought great requirements of a new non-intrusive, multilevel context-aware security model along with descriptive, well-defined, and flexible security policy language. As a mutual infrastructure of developing or deploying RFID-enabled application, RFID middleware can provide basic secure context-aware framework, which allows users or developers to specify security context relationship and boundaries, then it delegates the complex security decision making process to middleware which helps fast developing or deploying efficient secure RFID context-aware applications.This paper focuses on RFID-enabled context-aware applications, and in order to design a context-aware security component of RFID middleware, which increases the security confidence of RFID-based context-aware applications. During the process of research of RFID context-aware application and context sensitive security technique, we design an improved model called context-aware security domain by combing the complex event driven model of RFID middleware, and it constructs a dynamic security decision making environments based on confidential context information, which can largely improve the performance of enforcing security policies. Moreover, event driven context management model provides a declarative interface to user and transfers the work of processing complex context relationship to RFID middleware, which brings great efficiency enhancement to developing of secure context-aware systems.First, In order to get the security requirements and design principles of the security framework, the author analyzes the characteristics of context, context-aware services and architecture of RFID context-aware applications. Then, we go deep into the context-aware security techniques, and design an improved event driven context management and context-aware security model. Finally, the author presents the detailed design and implementation of this module.
Keywords/Search Tags:Context-Aware, Security, RFID, Middleware
PDF Full Text Request
Related items