A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security in Bluetooth, RFID and wireless sensor networks
2011
Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11
In this paper, an overview of security issues like attacks and its countermeasures for wireless personal area networks such as Bluetooth, RFID and wireless sensor networks has been provided. ...
However, due to the broadcast nature of these networks and the heterogeneity of devices on these networks, new security problems will arise, because the different types of devices have different capabilities ...
Acknowledgment The authors are indebted to Information Security Education and Awareness (ISEA) Project, MCIT, Department of Information Technology, Govt. of India, for sponsoring this research and development ...
doi:10.1145/1947940.1948071
dblp:conf/icccs/PanigrahyJT11
fatcat:hweocwgplnhvrlr4fpi7snj7xm
A Review Study on Secure Authentication in Mobile System
2014
International Journal of Computer Applications Technology and Research
In mobile environment, the users communicate with each other about location based information and services with the help of network nodes. But providing security to data has become a difficult task. ...
Security model should adjust with various capability requirements and security requirements of a mobile system This paper provides a survey on security in mobile systems ...
Active tag has a battery attached on-board and it transmits its ID signal periodically. It is also known as Battery assisted passive tags that are activated in the presence of an RFID reader. ...
doi:10.7753/ijcatr0310.1008
fatcat:zo2g76qdajfsriqovn2nb6ckly
Qualitative Assessment on Effectiveness of Security Approaches towards safeguarding NFC Devices & Services
2018
International Journal of Electrical and Computer Engineering (IJECE)
Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are not so difficult to compromise to result in ...
<span>The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between user-experience and security demands exists. ...
[11] have presented a discussion of different forms of threats in NFC and briefed that majority of the attacks in NFC are generated from card emulation mode (denial of service, relay attack) as well ...
doi:10.11591/ijece.v8i2.pp1214-1221
fatcat:cdyp7oh2jrewveo4y4atctwnca
Security and privacy in RFID and applications in telemedicine
2006
IEEE Communications Magazine
Then two RFID applications in telemedicine are proposed: studying supply and demand of doctors, nurses, and patients in hospitals and healthcare, and developing mobile telemedicine services. ...
The security and privacy issues of RFID, and their solutions are discussed as well. ...
The authors would like to thank Dr. Lan Wang for her preliminary work in mobile telemedicine service. ...
doi:10.1109/mcom.2006.1632651
fatcat:q2o2npp32rgv7j36wygiyhkskm
Architectural Layers of Internet of Things: Analysis of Security Threats and Their Countermeasures
2018
Scientific Review
The paper identifies device authentication on IoT network to be of paramount importance in securing IoT systems. ...
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called Internet of Things has prompted a drastic change in demand of smart devices which in ...
(vii) Denial of Service Attack: The attacker tries to launch attack on all users in a network of IoT system at the same time by injecting denial of service attack on IoT network hence authorized users ...
doi:10.32861/sr.410.80.89
fatcat:dwgczkgpnjhprn5ehjy7ibe4gu
Internet of Things and Smart Objects for M-health Monitoring and Control
2014
Procedia Technology - Elsevier
RFID tags in medical context enable a rapid and precise identification of each smart entity, enabling a ubiquitous and quick access to Personal Health Records over an Internet of Things. ...
-turn this whole context into a decentralized and mobile healthcare system. ...
Acknowledgements This work has been partially supported by FCT -Fundação para a Ciência e Tecnologia, in the scope of the project: PEst-OE/EEI/UI0319/2014. ...
doi:10.1016/j.protcy.2014.10.152
fatcat:piamtbaswjd5bnrgpcydcjdae4
Analysis of IoT security issues used in Higher Education Institutions
2021
Zenodo
The holistic analysis conducted in this article aimed to identify vulnerabilities, cyber-attacks and ways to mitigate them in IoT systems, which are increasingly implemented in Higher Education Institutions ...
professionals in Industry 4.0, represents the future of education.That is why the security analysis of IoT systems is very important to ensure the confidentiality,integrity and availability of academic ...
-RF Interference on RFIDs, a Denial of Service attack can be implemented on any RFID tag by creating and sending noise signals over the Radio Frequency signals which are used by the RFIDs for communication ...
doi:10.5281/zenodo.4739079
fatcat:363s5goz4zcdpjfflhouzf7pg4
Internet of Things (IoT) Technologies - A Study
2019
International Journal for Research in Applied Science and Engineering Technology
It is designed in a way to work without presence of human. ...
In future years of IoT is to create the main hub between the various Technologies by connecting smart physical objects together and form different applications along related issues. ...
In addition to eavesdropping, also other types of attacks such as man-in-the-middle, denial-of-service or replay attacks can be applied to unsecured NFC communication Despite these potential issues, NFC ...
doi:10.22214/ijraset.2019.2142
fatcat:6e67d5c46vfzlmr4f5qedpjpjy
Multilevel Secure RFID Based Object Tracking System
2016
Procedia Computer Science
The use of 128 bit PRNG and XOR protocol across RFID system and applying Binary ECC while sending data via GSM communication will surely boost up safety measures of object tracking system as depicted in ...
Security is an important issue in our everyday life. System based on different wireless protocol standards is vulnerable to security threats. ...
Acknowledgements A success of any work depends on efforts of many folks. I would like to take this chance to express my gratitude
MICROCONTROLLER INTERFACING WITH GPS AND GSM MODULE ...
doi:10.1016/j.procs.2016.02.068
fatcat:wewjlwxgcrgg7llo2r5iue35e4
A survey of IoT security threats and defenses
2019
International Journal of Advanced Computer Research
Keywords Internet of things (IoT), Radio frequency identification (RFID), Big data analytics, Distributed denial of services (DDoS). Hassan I. ...
In this paper, we address different security challenges, threats, and defenses in the layers of IoT systems. ...
Conflicts of interest The authors have no conflicts of interest to declare. ...
doi:10.19101/ijacr.2019.940088
fatcat:wt3yxyezpvd2vcoictluggdei4
Deployment of IoT based smart environment : key issues and challenges
2018
International Journal of Engineering & Technology
It introduces physical objects in the sphere of cyber world. ...
A number of wireless sensor technologies are implemented in IoT viz. RFID, ZigBee, actuators, WiFi and wireless sensor networks (WSNs). ...
Blocking When an attacker uses a blocker-tag so as to stimulate the presence of several tags and as a result, it causes Denial of Service (DoS). ...
doi:10.14419/ijet.v7i2.9504
fatcat:6pi67dogxncdbniu5wgl7qy4da
Possibility of RFID in Conditions of Postal Operators
[chapter]
2013
Radio Frequency Identification from System to Applications
We will be talk about basic of RFID, possibility of technology in postal and logistics processes, other mobile technology in processes, security of technology with contents to postal services, impact of ...
Let's looks at some of the basic components of a typical RFID system. RFID tag/label RFID units are in a class of radio devices known as transponders. ...
Acknowledgement This work was supported in part by grant and research project VEGA 1/0421/12 -Modeling diffusion of knowledge in business value chains (60%), Centre of excellence for systems and services ...
doi:10.5772/53285
fatcat:67sdla72arf3fbpqxi7t5vcrqa
A Review of Internet of Things Architecture, Technologies and Analysis Smartphone-based Attacks Against 3D printers
[article]
2017
arXiv
pre-print
The rapid development of new applications using smartphones in the world caused all users of the IoT community to be faced with one major challenge of security in the form of side channel attacks against ...
The 3D printing estimated value reached 20.2 billion of dollars in 2021. The thermal camera is used for exploring the side channel attacks after reconstructing the objects against 3D printers. ...
The security issues in the IoT network layer are network congestions, RFID interference, eavesdropping attack, routing attack, denial of service, Sybil attack node jumping in WSN and heterogeneity problem ...
arXiv:1708.04560v1
fatcat:2ykbj6h7anbu7eik4ccbmgs5ui
RFID (Radio-Frequency Identification)
[chapter]
2012
Handbook of Computer Networks
Deployment of radio frequency identification (RFID) systems is rapidly growing and has the potential to affect many different industries and applications. ...
We present a brief history of RFID technology and automatic identification systems. We summarize major RFID applications, and present a primer on RFID fundamental principles. ...
Denial of Service Weaker attackers unable to conduct espionage or forgery attacks may still be able to sabotage RFID systems or conduct denial of service attacks. ...
doi:10.1002/9781118256107.ch63
fatcat:4pryc56lfbhgbas56b2cm46xua
RFID-Based Authentication Middleware for Mobile Devices
2010
2010 43rd Hawaii International Conference on System Sciences
This paper details the architecture of RFID-AM, discusses its fully functional prototype, and presents experimental results demonstrating its performance in various conditions. ...
Consequently, the problem of securing mobile devices against unauthorized access has never been more important. ...
In addition to privacy issues, RFID technology is open to the following security threats: eavesdropping, denial of services attack, relay attack, and tag cloning. ...
doi:10.1109/hicss.2010.320
dblp:conf/hicss/SytaKC10
fatcat:zcuo24sneffn7ogpzgwqcyv6bu
« Previous
Showing results 1 — 15 out of 825 results