Filters








392 Hits in 5.1 sec

Contact-based fault injections and power analysis on RFID tags

Michael Hutter, Jorn-Marc Schmidt, Thomas Plos
<span title="">2009</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cbmv5er2eraqfj4kpvcqqbnoma" style="color: black;">2009 European Conference on Circuit Theory and Design</a> </i> &nbsp;
We describe a contactbased measurement setup that allows both injection of faults and measuring of the power consumption of passive RFID tags.  ...  This powersupply connection is often exploited to extract the secret key by applying fault-injection methods and power-analysis attacks.  ...  research described in this paper has been supported by the European Commission funded project ECRYPT II under contract ICT-2007-216646, Collaboration at Rural under grant number 034921 (Project C@R) and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ecctd.2009.5275012">doi:10.1109/ecctd.2009.5275012</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ecctd/HutterSP09.html">dblp:conf/ecctd/HutterSP09</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nngcnb6ykvfipprfncmmcgltra">fatcat:nngcnb6ykvfipprfncmmcgltra</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160628055106/http://mhutter.org/papers/Hutter2009ContactBasedFault.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1e/d8/1ed8ad6cfa124327d8bc4828edd076e1737a79e0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ecctd.2009.5275012"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

On the security of RFID devices against implementation attacks

Michael Hutter, Thomas Plos, Martin Feldhofer
<span title="">2010</span> <i title="Inderscience Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ufkuamvrurhuddcxn3x7aza3uq" style="color: black;">International Journal of Security and Networks (IJSN)</a> </i> &nbsp;
In this paper, we evaluate the efficiency of implementation attacks by conducting side-channel attacks and fault analysis on both High Frequency (HF) and Ultra-High Frequency (UHF) RFID tags.  ...  His main research topic is the low-power hardware implementation of cryptographic modules. Currently, he is working on the implementation of DPA-secure symmetric and asymmetric crypto algorithms.  ...  The performed power-analysis attacks on the commercially-available RFID tag and the tag prototype have been successful.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijsn.2010.032209">doi:10.1504/ijsn.2010.032209</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wrr52g3ywnfjfdeheslrjl6nfm">fatcat:wrr52g3ywnfjfdeheslrjl6nfm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160627080833/http://mhutter.org/papers/Hutter2010OntheSecurity.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/c1/1bc1dae75cbf947d6f1566a46f8e2bc4cb38998b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijsn.2010.032209"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Study of Security Vulnerabilities in Mobile environment

Suk-jin Kim, Hyangran Lee, Malrey Lee
<span title="2015-12-31">2015</span> <i title="The International Promotion Agency of Culture Technology"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wkjakxde4vgmfa4sdqdt44ni6a" style="color: black;">The International Journal of Advanced Culture Technology</a> </i> &nbsp;
However, security and privacy issues and risks are introduced by pervasiveness of RFID systems. In RFID systems, communication between tag and reader usually takes place via wireless communication.  ...  Now day's application had focus more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that become important for security.  ...  ACKNOWLEDGEMENTS This work (Grants No: 1401001175) was supported by Business for Academic-industrial Cooperative establishments funded Korea Small and Medium Business Administration in 2015.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17703/ijact.2015.3.2.149">doi:10.17703/ijact.2015.3.2.149</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dbf3vgagajf7va4pdxxbkqy4le">fatcat:dbf3vgagajf7va4pdxxbkqy4le</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030051853/http://www.ndsl.kr/soc_img/society/ipact/E1GMBY/2015/v3n2/E1GMBY_2015_v3n2_149.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/91/d8/91d821ca92a851fea67d35e8a22919d1b8780a29.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17703/ijact.2015.3.2.149"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Security Vulnerabilities in RFID Networks

Junaid Ahsenali Chaudhry, Malrey Lee
<span title="2013-11-30">2013</span> <i title="The Institute of Webcasting, Internet and Telecommunication"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xamlvzde5zcord7hjb6ijzz2pe" style="color: black;">International journal of advanced smart convergence</a> </i> &nbsp;
However, security and privacy issues and risks are introduced by pervasiveness of RFID systems. In RFID systems, communication between tag and reader usually takes place via wireless communication.  ...  Nowaday's application, that is focused more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that became important for security.  ...  Global fault-injection methods on HF and UHF tags are described as well as local methods.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7236/ijasc2013.2.2.7">doi:10.7236/ijasc2013.2.2.7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lsynrr4srvcttpdredyqjkh57i">fatcat:lsynrr4srvcttpdredyqjkh57i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725031857/http://www.ndsl.kr/soc_img/society/iwitt/OTNBCL/2013/v2n2/OTNBCL_2013_v2n2_27.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2f/ea/2fea429ee336cf21545c2574926a1ff064b132a8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7236/ijasc2013.2.2.7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices [chapter]

Timo Kasper, David Oswald, Christof Paar
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We introduce several methods for the automatic profiling of cryptographic devices and model their behaviour both with respect to side-channel analysis and fault injection.  ...  We present a unified framework for advanced implementation attacks that allows for conducting automated side-channel analysis and fault injection targeting all kinds of embedded cryptographic devices including  ...  ., power analysis (Differential Power Analysis (DPA), Simple Power Analysis (SPA), template attacks), and active attacks, i.e., fault injection or microprobing.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-17499-5_5">doi:10.1007/978-3-642-17499-5_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yd7vx5jw5vh2boctlr2z2hjxcm">fatcat:yd7vx5jw5vh2boctlr2z2hjxcm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811052147/http://www.ei.rub.de/media/crypto/veroeffentlichungen/2011/04/22/framework.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/db/1e/db1e87c82af4b26845c9e3ed9d838ed967f29a2c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-17499-5_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags

Thomas Plos, Manfred Aigner, Thomas Baier, Martin Feldhofer, Michael Hutter, Thomas Korak, Erich Wenger
<span title="2012-06-01">2012</span> <i title="Infonomics Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/okwqpsnmdncblmxy2kmwohy6rq" style="color: black;">International Journal of RFID Security and Cryptography</a> </i> &nbsp;
Many of these applications base on the successful implementation of security services on the RFID tag side but also on the reader side.  ...  The shown microcontroller-based and FPGA-based tag platforms can operate in the HF and the UHF range.  ...  The third use case illustrates how the DemoTags were used to develop an analysis setup for so called side-channel analysis (SCA) attacks on RFID tags.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.20533/ijrfidsc.2046.3715.2012.0003">doi:10.20533/ijrfidsc.2046.3715.2012.0003</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gfxogv5urnbgdhgqksrqkxifpi">fatcat:gfxogv5urnbgdhgqksrqkxifpi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160627102558/http://mhutter.org/papers/Plos2012SemiPassiveRFID.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/03/5b/035b3fb417d973488e7e56801f3118bf29bdb74c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.20533/ijrfidsc.2046.3715.2012.0003"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Autonomous pipeline monitoring and maintenance system: a RFID-based approach

Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar, Nagarajan Prabakar
<span title="">2015</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a5gjzjadkzbirdua4xdqipotp4" style="color: black;">EURASIP Journal on Wireless Communications and Networking</a> </i> &nbsp;
To overcome these challenges, we propose a novel Radio Frequency IDentification (RFID)-based Autonomous Maintenance system for Pipelines, called RAMP, which combines robotic, sensing, and RFID technologies  ...  Pipeline networks are one of the key infrastructures of our modern life.  ...  The McRAIT architecture provides fault-tolerance using multiple multi-channel RFID tags and adapts to the channel of each tag.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13638-015-0495-y">doi:10.1186/s13638-015-0495-y</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yav2o6downc47avq6g4a3dyuqi">fatcat:yav2o6downc47avq6g4a3dyuqi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810123211/https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-015-0495-y?site=jwcn.eurasipjournals.springeropen.com" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/de/8b/de8b8829ed18434fe50d0907e952b1c5b40294fe.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13638-015-0495-y"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

The role of RFID in agriculture: Applications, limitations and challenges

Luis Ruiz-Garcia, Loredana Lunadei
<span title="">2011</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bitt7mr5gbbnxb3hc7d4rccdzy" style="color: black;">Computers and Electronics in Agriculture</a> </i> &nbsp;
Authors requiring further information regarding Elsevier's archiving and manuscript policies are encouraged to visit: The recent advances in RFID offer vast opportunities for research, development and  ...  The implementation of sensors in tags, make possible to monitor the cold chain of perishable food products and the development of new applications in fields like environmental monitoring, irrigation, specialty  ...  RFID devices are more accurate and can be read without the need of visual contact (Abad et al., 2009 ).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.compag.2011.08.010">doi:10.1016/j.compag.2011.08.010</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2eb7lcsd2fes3krt6mw7fuzu6i">fatcat:2eb7lcsd2fes3krt6mw7fuzu6i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120414044117/http://oa.upm.es/9621/1/LuisRG_2011_COMPAG_The_role_of_RFID_in_agriculture_Applications_limitations_and_challenges.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8b/c0/8bc01182669d5ee49be45933f583b69a8369912a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.compag.2011.08.010"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Security of Wireless Embedded Devices in the Real World [chapter]

Timo Kasper, David Oswald, Christof Paar
<span title="">2012</span> <i title="Vieweg+Teubner Verlag"> ISSE 2011 Securing Electronic Business Processes </i> &nbsp;
., electronic passports, the remote keyless entry system KeeLoq, a Mifare Classic based contactless payment system, and a public transport system relying on Mifare DESfire cards we demonstrate that it  ...  Portable tokens communicating via an RF (Radio Frequency) interface are employed in contactless applications such as access control, identification, and payments.  ...  Power Analysis of KeeLoq The developed highly efficient SCA attacks based on Simple Power Analysis (SPA) and Correlation Power Analysis (CPA) techniques enable to break the wireless access control system  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-8348-8652-1_16">doi:10.1007/978-3-8348-8652-1_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/btgggkxq6jexph7c6zpwlglf3e">fatcat:btgggkxq6jexph7c6zpwlglf3e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160506132152/http://www.emsec.rub.de/media/crypto/veroeffentlichungen/2011/11/29/preprint_version_ISSE_wireless.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/43/5c/435c24140fd7b8a7f5ccdff0d68d786027d57649.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-8348-8652-1_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

WinRFID: A Middleware for the Enablement of Radiofrequency Identification (RFID)-Based Applications [chapter]

B.S. Prabhu, Xiaoyong Su, Harish Ramamurthy, Chi-Cheng Chu, Rajit Gadh
<span title="2006-03-28">2006</span> <i title="John Wiley &amp; Sons, Inc."> Mobile, Wireless, and Sensor Networks </i> &nbsp;
patterns, correlating events, reorganizing and scrubbing data and recovering from faults and exceptions.  ...  Radio Frequency Identification (RFID) middleware is a new class of software which facilitates data and information communication between automatic identification physical layer and enterprise applications  ...  RFID does not require line-of-sight access to communicate -without requiring physical contact, multiple tags can be identified, and tags mounted on products or consignments can survive in harsh environments  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/0471755591.ch12">doi:10.1002/0471755591.ch12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jocsvdb2mjblba7jczenxh5xny">fatcat:jocsvdb2mjblba7jczenxh5xny</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060216001338/http://wireless.ucla.edu:80/techreports2/UCLA-WinRFID.PDF" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/29/b0/29b04a92d3a2c8810b69c6cbd837a73dff602a33.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/0471755591.ch12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

A holistic approach examining RFID design for security and privacy

Tim Good, Mohammed Benaissa
<span title="2010-12-08">2010</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qhbautqnvzgwvm3vvdvieylhwq" style="color: black;">Journal of Supercomputing</a> </i> &nbsp;
The analysis presented shows a security of 64-bits against many attack methods. Both modelled and measured power results are presented.  ...  In this context, a practical realization of a secure passive (battery-less) RFID tag is presented.  ...  The authors wish to thank Jo Spreutels and Erwin Deumens of IMEC and Lisa Wong and Mark Wilmott at the Microelectronic Support Unit, Rutherford-Appleton Laboratory for assistance with the design flow and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11227-010-0497-9">doi:10.1007/s11227-010-0497-9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2qscmzsddfev7i2qsqsjybqds4">fatcat:2qscmzsddfev7i2qsqsjybqds4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180724000500/http://eprints.whiterose.ac.uk/131698/3/holisticRFIDpostreview_final.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/21/96/2196c7f1fc729dbdd3178476d5119ef3105e5284.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11227-010-0497-9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Review of IoT Sensing Applications and Challenges Using RFID and Wireless Sensor Networks

Hugo Landaluce, Laura Arjona, Asier Perallos, Francisco Falcone, Ignacio Angulo, Florian Muralter
<span title="2020-04-28">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
connected sensing tags.  ...  RFID systems are able to identify and track devices, whilst WSNs cooperate to gather and provide information from interconnected sensors.  ...  One of the most famous RFID positioning algorithms is LANDMARC [29] . The LANDMARC system is a typical reference-tag-based RFID positioning method.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20092495">doi:10.3390/s20092495</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/32354063">pmid:32354063</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC7249175/">pmcid:PMC7249175</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r3ywla4q65dkjln53upsiewxmu">fatcat:r3ywla4q65dkjln53upsiewxmu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200710135321/https://res.mdpi.com/d_attachment/sensors/sensors-20-02495/article_deploy/sensors-20-02495-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c2/4f/c24fa89b5922a52cc902590dcbfb8546230c7d0f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20092495"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7249175" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Lend me your arms: The use and implications of humancentric RFID

Amelia Masters, Katina Michael
<span title="">2007</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pxenytfo2ndyhdlpzhbibav3pi" style="color: black;">Electronic Commerce Research and Applications</a> </i> &nbsp;
Recent developments in the area of RFID have seen the technology expand from its role in industrial and animal tagging applications, to being implantable in humans.  ...  Abstract: Recent developments in the area of RFID have seen the technology expand from its role in industrial and animal tagging applications, to being implantable in humans.  ...  In recent years however, alongside traditional contact cards, we have seen the emergence of alternate payment processes-RFID being one of these.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.elerap.2006.04.008">doi:10.1016/j.elerap.2006.04.008</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/z75roumjajamdewztjhvfbrhpa">fatcat:z75roumjajamdewztjhvfbrhpa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719225208/http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1390&amp;context=infopapers" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/67/49/67498e2ca687038f64dc0dad6ca29c98d51b2f7d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.elerap.2006.04.008"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

A survey of IoT security threats and defenses

Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid, Heba K. Aslan
<span title="2019-10-25">2019</span> <i title="Association of Computer, Communication and Education for National Triumph Social and Welfare Society (ACCENTS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/h6wni7yfjratfglwchnpmbf2iu" style="color: black;">International Journal of Advanced Computer Research</a> </i> &nbsp;
Moreover, the challenges of the IoT especially big data and also the evaluation strategies of the IoT system and their effects on the security operations have been evaluated.  ...  The IoT system is considered one of the most important technologies in recent decades, and the focus of attention in many fields including healthcare, industry, agriculture, military applications, and  ...  The cloned tag detection protocol to anonymous RFID based on the improved tree-based anti-collision algorithm. BASE, DeClone and DeClone + [107] BASE ID-independent protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.19101/ijacr.2019.940088">doi:10.19101/ijacr.2019.940088</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wt3yxyezpvd2vcoictluggdei4">fatcat:wt3yxyezpvd2vcoictluggdei4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200211033950/https://www.accentsjournals.org/PaperDirectory/Journal/IJACR/2019/11/1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/51/42/5142749dbe830d6108b8ef45807a98a4d69a2cca.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.19101/ijacr.2019.940088"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Internet of Things: Architecture, Applications and Challenges

Mubashir Hussain, Mohammad Saqib
<span title="2021-04-19">2021</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
Internet of Things (IoT)"a relatively recent term, build on decades of research has revolutionized almost every field in today's world.  ...  This paper is devoted to study the security architecture and its features in the domain of IoT. In the next part of the paper, the need and applications of IoT in various fields are discussed.  ...  RFID Cloning: In this type of attack, adversary copying data from pre-existing RFID tag to another RFID tag [4] . Original ID of RFID tag is not copied.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2021921225">doi:10.5120/ijca2021921225</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4tthdkig6rcd7narkws2kbcmsy">fatcat:4tthdkig6rcd7narkws2kbcmsy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220422230240/https://www.ijcaonline.org/archives/volume174/number29/hussain-2021-ijca-921225.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/26/52/26529e884a3d58b6e72285d186ad055e099ce2a6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2021921225"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 392 results