825 Hits in 6.6 sec

Security in Bluetooth, RFID and wireless sensor networks

Saroj Kumar Panigrahy, Sanjay Kumar Jena, Ashok Kumar Turuk
2011 Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11  
In this paper, an overview of security issues like attacks and its countermeasures for wireless personal area networks such as Bluetooth, RFID and wireless sensor networks has been provided.  ...  However, due to the broadcast nature of these networks and the heterogeneity of devices on these networks, new security problems will arise, because the different types of devices have different capabilities  ...  Acknowledgment The authors are indebted to Information Security Education and Awareness (ISEA) Project, MCIT, Department of Information Technology, Govt. of India, for sponsoring this research and development  ... 
doi:10.1145/1947940.1948071 dblp:conf/icccs/PanigrahyJT11 fatcat:hweocwgplnhvrlr4fpi7snj7xm

A Review Study on Secure Authentication in Mobile System

Ahitha. H.S, Deepa. A.J
2014 International Journal of Computer Applications Technology and Research  
In mobile environment, the users communicate with each other about location based information and services with the help of network nodes. But providing security to data has become a difficult task.  ...  Security model should adjust with various capability requirements and security requirements of a mobile system This paper provides a survey on security in mobile systems  ...  Active tag has a battery attached on-board and it transmits its ID signal periodically. It is also known as Battery assisted passive tags that are activated in the presence of an RFID reader.  ... 
doi:10.7753/ijcatr0310.1008 fatcat:zo2g76qdajfsriqovn2nb6ckly

Qualitative Assessment on Effectiveness of Security Approaches towards safeguarding NFC Devices & Services

Anusha R, Veena Devi Shastrimat V
2018 International Journal of Electrical and Computer Engineering (IJECE)  
Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are not so difficult to compromise to result in  ...  <span>The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between user-experience and security demands exists.  ...  [11] have presented a discussion of different forms of threats in NFC and briefed that majority of the attacks in NFC are generated from card emulation mode (denial of service, relay attack) as well  ... 
doi:10.11591/ijece.v8i2.pp1214-1221 fatcat:cdyp7oh2jrewveo4y4atctwnca

Security and privacy in RFID and applications in telemedicine

Yang Xiao, Xuemin Shen, BO Sun, Lin Cai
2006 IEEE Communications Magazine  
Then two RFID applications in telemedicine are proposed: studying supply and demand of doctors, nurses, and patients in hospitals and healthcare, and developing mobile telemedicine services.  ...  The security and privacy issues of RFID, and their solutions are discussed as well.  ...  The authors would like to thank Dr. Lan Wang for her preliminary work in mobile telemedicine service.  ... 
doi:10.1109/mcom.2006.1632651 fatcat:q2o2npp32rgv7j36wygiyhkskm

Architectural Layers of Internet of Things: Analysis of Security Threats and Their Countermeasures

2018 Scientific Review  
The paper identifies device authentication on IoT network to be of paramount importance in securing IoT systems.  ...  A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called Internet of Things has prompted a drastic change in demand of smart devices which in  ...  (vii) Denial of Service Attack: The attacker tries to launch attack on all users in a network of IoT system at the same time by injecting denial of service attack on IoT network hence authorized users  ... 
doi:10.32861/sr.410.80.89 fatcat:dwgczkgpnjhprn5ehjy7ibe4gu

Internet of Things and Smart Objects for M-health Monitoring and Control

Alexandre Santos, Joaquim Macedo, António Costa, M. João Nicolau
2014 Procedia Technology - Elsevier  
RFID tags in medical context enable a rapid and precise identification of each smart entity, enabling a ubiquitous and quick access to Personal Health Records over an Internet of Things.  ...  -turn this whole context into a decentralized and mobile healthcare system.  ...  Acknowledgements This work has been partially supported by FCT -Fundação para a Ciência e Tecnologia, in the scope of the project: PEst-OE/EEI/UI0319/2014.  ... 
doi:10.1016/j.protcy.2014.10.152 fatcat:piamtbaswjd5bnrgpcydcjdae4

Analysis of IoT security issues used in Higher Education Institutions

Alexei Arina, Alexei Anatolie
2021 Zenodo  
The holistic analysis conducted in this article aimed to identify vulnerabilities, cyber-attacks and ways to mitigate them in IoT systems, which are increasingly implemented in Higher Education Institutions  ...  professionals in Industry 4.0, represents the future of education.That is why the security analysis of IoT systems is very important to ensure the confidentiality,integrity and availability of academic  ...  -RF Interference on RFIDs, a Denial of Service attack can be implemented on any RFID tag by creating and sending noise signals over the Radio Frequency signals which are used by the RFIDs for communication  ... 
doi:10.5281/zenodo.4739079 fatcat:363s5goz4zcdpjfflhouzf7pg4

Internet of Things (IoT) Technologies - A Study

Linguberi Sravani
2019 International Journal for Research in Applied Science and Engineering Technology  
It is designed in a way to work without presence of human.  ...  In future years of IoT is to create the main hub between the various Technologies by connecting smart physical objects together and form different applications along related issues.  ...  In addition to eavesdropping, also other types of attacks such as man-in-the-middle, denial-of-service or replay attacks can be applied to unsecured NFC communication Despite these potential issues, NFC  ... 
doi:10.22214/ijraset.2019.2142 fatcat:6e67d5c46vfzlmr4f5qedpjpjy

Multilevel Secure RFID Based Object Tracking System

Ajinkya C. Bapat, Sonali U. Nimbhorkar
2016 Procedia Computer Science  
The use of 128 bit PRNG and XOR protocol across RFID system and applying Binary ECC while sending data via GSM communication will surely boost up safety measures of object tracking system as depicted in  ...  Security is an important issue in our everyday life. System based on different wireless protocol standards is vulnerable to security threats.  ...  Acknowledgements A success of any work depends on efforts of many folks. I would like to take this chance to express my gratitude MICROCONTROLLER INTERFACING WITH GPS AND GSM MODULE  ... 
doi:10.1016/j.procs.2016.02.068 fatcat:wewjlwxgcrgg7llo2r5iue35e4

A survey of IoT security threats and defenses

Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid, Heba K. Aslan
2019 International Journal of Advanced Computer Research  
Keywords Internet of things (IoT), Radio frequency identification (RFID), Big data analytics, Distributed denial of services (DDoS). Hassan I.  ...  In this paper, we address different security challenges, threats, and defenses in the layers of IoT systems.  ...  Conflicts of interest The authors have no conflicts of interest to declare.  ... 
doi:10.19101/ijacr.2019.940088 fatcat:wt3yxyezpvd2vcoictluggdei4

Deployment of IoT based smart environment : key issues and challenges

Deepti Sehrawat, Nasib Singh Gill
2018 International Journal of Engineering & Technology  
It introduces physical objects in the sphere of cyber world.  ...  A number of wireless sensor technologies are implemented in IoT viz. RFID, ZigBee, actuators, WiFi and wireless sensor networks (WSNs).  ...  Blocking When an attacker uses a blocker-tag so as to stimulate the presence of several tags and as a result, it causes Denial of Service (DoS).  ... 
doi:10.14419/ijet.v7i2.9504 fatcat:6pi67dogxncdbniu5wgl7qy4da

Possibility of RFID in Conditions of Postal Operators [chapter]

Juraj Vaculk, Peter Kolarovszki, Ji Tengler
2013 Radio Frequency Identification from System to Applications  
We will be talk about basic of RFID, possibility of technology in postal and logistics processes, other mobile technology in processes, security of technology with contents to postal services, impact of  ...  Let's looks at some of the basic components of a typical RFID system. RFID tag/label RFID units are in a class of radio devices known as transponders.  ...  Acknowledgement This work was supported in part by grant and research project VEGA 1/0421/12 -Modeling diffusion of knowledge in business value chains (60%), Centre of excellence for systems and services  ... 
doi:10.5772/53285 fatcat:67sdla72arf3fbpqxi7t5vcrqa

A Review of Internet of Things Architecture, Technologies and Analysis Smartphone-based Attacks Against 3D printers [article]

Muhammad Bilal
2017 arXiv   pre-print
The rapid development of new applications using smartphones in the world caused all users of the IoT community to be faced with one major challenge of security in the form of side channel attacks against  ...  The 3D printing estimated value reached 20.2 billion of dollars in 2021. The thermal camera is used for exploring the side channel attacks after reconstructing the objects against 3D printers.  ...  The security issues in the IoT network layer are network congestions, RFID interference, eavesdropping attack, routing attack, denial of service, Sybil attack node jumping in WSN and heterogeneity problem  ... 
arXiv:1708.04560v1 fatcat:2ykbj6h7anbu7eik4ccbmgs5ui

RFID (Radio-Frequency Identification) [chapter]

Stephen A. Weis
2012 Handbook of Computer Networks  
Deployment of radio frequency identification (RFID) systems is rapidly growing and has the potential to affect many different industries and applications.  ...  We present a brief history of RFID technology and automatic identification systems. We summarize major RFID applications, and present a primer on RFID fundamental principles.  ...  Denial of Service Weaker attackers unable to conduct espionage or forgery attacks may still be able to sabotage RFID systems or conduct denial of service attacks.  ... 
doi:10.1002/9781118256107.ch63 fatcat:4pryc56lfbhgbas56b2cm46xua

RFID-Based Authentication Middleware for Mobile Devices

Ewa Syta, Stan Kurkovsky, Bernardo Casano
2010 2010 43rd Hawaii International Conference on System Sciences  
This paper details the architecture of RFID-AM, discusses its fully functional prototype, and presents experimental results demonstrating its performance in various conditions.  ...  Consequently, the problem of securing mobile devices against unauthorized access has never been more important.  ...  In addition to privacy issues, RFID technology is open to the following security threats: eavesdropping, denial of services attack, relay attack, and tag cloning.  ... 
doi:10.1109/hicss.2010.320 dblp:conf/hicss/SytaKC10 fatcat:zcuo24sneffn7ogpzgwqcyv6bu
« Previous Showing results 1 — 15 out of 825 results