Filters








8 Hits in 10.2 sec

RFID Technology, Security Vulnerabilities, and Countermeasures [chapter]

Qinghan Xiao, Thomas Gibbons, Herv Lebru
2009 Supply Chain the Way to Flat Organisation  
Power analysis Power analysis is a form of side-channel attack that is intended to retrieve information by analyzing changes in the power consumption of a device.  ...  RFID tag categories RFID tags are at the heart of an RFID system, and can be categorized as active, semiactive/semi-passive and passive in relation to power, as well as read/write and read only in terms  ...  This book discusses some of the latest development and findings addressing a number of key areas of aspect of supply chain management, including the application and development ICT and the RFID technique  ... 
doi:10.5772/6668 fatcat:vopadtcnfvhndmflyakqs2nphy

Trust and Security in RFID-Based Product Authentication Systems

Mikko O. Lehtonen, Florian Michahelles, Elgar Fleisch
2007 IEEE Systems Journal  
We first present a formal definition for product authentication process and then derive the general chain of trust as well as functional and nonfunctional security requirements for product authentication  ...  The benefits of implementing a service that detects the cloned tags in the level of the network's core services are identified.  ...  ACKNOWLEDGMENT The authors would like to thank M. Aigner and A. Ilic for their support, and the anonymous reviewers whose comments helped to improve this paper.  ... 
doi:10.1109/jsyst.2007.909820 fatcat:wtpav4ncojbo3ejfo7qgzwymqe

An RFID Attacker Behavior Taxonomy

Luke Mirowski, Jacqueline Hartnett, Raymond Williams
2009 IEEE pervasive computing  
A side-channel analysis, for example, can be performed when the attacker undertakes simple power analysis (SPA) attack to reveal the kill password of UHF tags, and once they have the kill password, the  ...  (MHz), passive Ultra High Frequency (UHF) RFID tags have reading distances of around 3m to 5m.  ...  This work has illustrated that the simulator's current instantiation is useful for preliminary 'whole of system' analysis expounded in this thesis. ;; APPENDIX B -SOURCE CODE FOR EXPERIMENTS B Appendix  ... 
doi:10.1109/mprv.2009.68 fatcat:zeqw77dwb5hw3k5chfgfu7xuju

A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things [article]

Sidra Zafar, Mohsin Nazir, Taimur Bakhshi, Hasan Ali Khattak, Sarmadullah Khan, Muhammad Bilal, Kim-Kwang Raymond Choo, Kyung-Sup Kwak7, Aneeqa Sabah
2021 pre-print
Bio-NanoThings are generally tiny, non-intrusive, and concealable devices that can be used for in-vivo applications such as intra-body sensing and actuation networks, where the use of artificial devices  ...  Advances in synthetic biology and nanotechnology have contributed to the design of tools that can be used to control, reuse, modify, and re-engineer cells' structure, as well as enabling engineers to effectively  ...  We thank all the other coauthors for their contributions in this research work.  ... 
doi:10.1109/access.2021.3093442 arXiv:2106.14273v1 fatcat:e32qiil5pngivc7iuv6cmlv3fq

Coimbatore-6410 4243

Tadeusz Hryniewicz, Tomasz Borowski, B Ramani, Anand Paul, Mr Kumar, Mr Ravichandran Advisor, T Devi, Latha Parameswaran, Chairperson, Ms Sampath, Ms Shaju, Mr Prashanth
unpublished
Active devices have power supply, where passive devices don't. NFC is based on the concept of message and reply [5] .  ...  the data for reducing the power and power unit-provide supply to the entire system [1] [2] .  ...  The vehicles are operated with one type of radio interface called on Board Unit (OBU), which is used for transforming the information between the vehicles and the Road Side Unit (RSU) that forms the small  ... 
fatcat:bq2eelzqujhjzfn6qevs75mdim

Technology for Humanitarian Action [chapter]

To Bear Witness  
) for continuing stimulating technical dialogues on the broad range of topics represented here.  ...  Acknowledgement The author would like to thank Drs.  ...  (RFID) tags for disaster triage.  ... 
doi:10.2307/j.ctt13x0296.33 fatcat:jg6omvfhxncwvgcj7gzw5kin2i

Newark, New Jersey

Chieh Chang, Chieh Chang, Chieh Chang
2009 unpublished
The customs organization, as an international stakeholder and a gatekeeper of a nation, has been called upon to simultaneously promote and protect international commerce against terrorism and traditional  ...  Part I states the underlying problem, provides a background of the issue with literature reviews, and gives an overview of the policy machinery process.  ...  For a system to work in an open supply chain, it has to be cheap because the company that puts the tag on a case or pallet is unlikely to be able to reuse it (RFID Journal 2007b).  ... 
fatcat:bjswtgu5dzcpzlrsvpitncghhu

Geometry of empire: radar as logistical medium GEOMETRY OF EMPIRE: RADAR AS LOGISTICAL MEDIUM Title and Department ____________________________________ Date GEOMETRY OF EMPIRE: RADAR AS LOGISTICAL MEDIUM

Judd Case, Judd Case, John Peters, Judd Case, John Peters
1972 unpublished
1 This study introduces logistical media and considers one example of such-radar. 1986) and others are discussed as preparing an understanding of logistical media as subtle but powerful devices of cognitive  ...  Benjamin described this disruption as the interruption of the present with the now.  ...  RFID tags, touted as the wireless version of universal product codes, are more versatile and more specific than bar codes.  ... 
fatcat:vka7ipxktveofdaydibd56x3ji