Filters








73 Hits in 6.0 sec

Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags [chapter]

Claude Castelluccia, Gildas Avoine
2006 Lecture Notes in Computer Science  
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation.  ...  It can also be used to securely refresh a tag's identifier by, for example, xoring the new identifier with the exchanged secret key.  ...  For that, a noisy tag must be installed in the reader's field. A noisy tag is a regular RFID tag that shares a secret key K with the reader (this key can be pre-configured).  ... 
doi:10.1007/11733447_21 fatcat:2rtt25pv4vai3n3eg5wa6oiqdu

Privacy-by-Design(PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

V.Ragunatha Nadarajah, Manmeet Mahinderjit Singh
2017 Advances in Science, Technology and Engineering Systems  
Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID ).  ...  As solution based on tag filtering techniques, existing NFC filtering, Intent filtering has merged together with Bloom filtering from RFID technology.  ...  Even though I has faced a lot of difficulties upon completing of this research.  ... 
doi:10.25046/aj020116 fatcat:w62ga7wrmvatvniwz5jimmiqmi

Standards, Security & Privacy Issues about Radio Frequency Identification (RFID)

Evsen Korkmaz, Alp Ustundag
2007 2007 1st Annual RFID Eurasia  
The other constraint that lays in the future proliferation of RFID tags is cost of tags. A barcode label can be produced at a cost of less than 1 cent per label.  ...  According to researchers, this technology could be ready for commercial use in three to six years (http://epic.org/privacy/rfid).  ...  As one might guess, this method can only be used for valuable goods. • Active Jamming Approach: The consumer uses a radio frequency device that could create a noisy environment by broadcasting radio signals  ... 
doi:10.1109/rfideurasia.2007.4368148 fatcat:zsskgvt77ncjfnmr5c4lt4qscu

RFID Data Management [chapter]

Sapna Tyagi, M Ayoub, A Q
2010 Radio Frequency Identification Fundamentals and Applications Bringing Research to Practice  
We can also think of data modelling as instructions for building a database. To make a "pretty" database, you have to follow a model as a means toward your desired end.  ...  exchanged and protected.  ...  This book is a very rich collection of articles written by researchers, teachers, engineers, and professionals with a strong background in the RFID area.  ... 
doi:10.5772/8001 fatcat:6fsiucaxinhljpai2f7g2b2g2m

Security Issues in Ubiquitous Computing* [chapter]

Frank Stajano
2010 Handbook of Ambient Intelligence and Smart Environments  
Acknowledgements This chapter is based on copyrighted material from my book Security for Ubiquitous Computing (both from the first edition published by Wiley in 2002 and from the draft  ...  Even though we have a pretty good understanding of low level security mechanisms and protocols (for instance, we are able to build efficient and robust ciphers, such as AES, that even major spy agencies  ...  What about RFID tags used in access control situations, such as door entry cards and subway access cards? Do you expect the key card to be a passive or an active tag?  ... 
doi:10.1007/978-0-387-93808-0_11 fatcat:avldavvpmrgqhamk6ewpck7k7y

The Survey on Near Field Communication

Vedat Coskun, Busra Ozdenizci, Kerem Ok
2015 Sensors  
NFC is compatible with the existing infrastructure spawned for Radio Frequency Identification (RFID) technology such as passive RFID tags and contactless ISO 14443 compatible readers.  ...  Smartphones could be used to lock/unlock the house, car, and office doors, pay for the newspaper, exchange business cards, pay for public transportation, tip a doorman, help disabled or elderly people  ...  NFC tags are some form of passive RFID tags. Figure 3 provides a protocol stack illustration for reader/writer mode.  ... 
doi:10.3390/s150613348 pmid:26057043 pmcid:PMC4507650 fatcat:ddxjqx2cebaopdxpg6jyctjsei

Optimal Proximity Proofs [chapter]

Ioana Boureanu, Serge Vaudenay
2015 Lecture Notes in Computer Science  
For instance, with a noise level of 5%, we obtain the same level of security as those of the pre-existent protocols, but we reduce the number of rounds needed from 181 to 54.  ...  Provably secure distance-bounding is a rising subject, yet an unsettled one; indeed, very few distance-bounding protocols, with formal security proofs, have been proposed.  ...  Prior to this, we have revised the formal model for distance-bounding protocols in a way which is closer to (the state of the art of) interactive proofs.  ... 
doi:10.1007/978-3-319-16745-9_10 fatcat:vjhim54hgbakhagkvk35lt2ar4

On Modeling Terrorist Frauds [chapter]

Serge Vaudenay
2013 Lecture Notes in Computer Science  
Quite recently, distance-bounding protocols received a lot of attention as they offer a good solution to thwart relay attacks.  ...  None of these protocols provide reasonable parameters to be used in practice with a good security.  ...  Acknowledgements The author thanks Marc Fischlin and Cristina Onete for their feedbacks. Also: many thanks to Ioana Boureanu for some memorable discussions about terrorism in distance bounding.  ... 
doi:10.1007/978-3-642-41227-1_1 fatcat:ttw3ifat7jgsba2jtb6w6cmmgi

IoT in Smart Cities: A Survey of Technologies, Practices and Challenges

Abbas Shah Syed, Daniel Sierra-Sosa, Anup Kumar, Adel Elmaghraby
2021 Smart Cities  
for citizens.  ...  The IoT for Smart Cities has many different domains and draws upon various underlying systems for its operation.  ...  readers for reading RFID tags and other such devices.  ... 
doi:10.3390/smartcities4020024 fatcat:bzflvlmudjg5jmamtsrwep4n5i

DIY for CHI

Leah Buechley, Daniela K. Rosner, Eric Paulos, Amanda Williams
2009 Proceedings of the 27th international conference extended abstracts on Human factors in computing systems - CHI EA '09  
In a pinch, you can change babies anywhere you can lay them down, but long term, for the sake of your back, waist height is best.  ...  In this regard, changing a cloth diaper is like changing any diaper, but it bears mentioning: It's easier to change the baby if you have him or her positioned at waist height for you.  ...  The following is the protocol for flashmob style collaboration: Change a cloth diaper!  ... 
doi:10.1145/1520340.1520750 dblp:conf/chi/BuechleyRPW09 fatcat:zbmldbatmngh3par3o62bldo4y

Intelligent Computing Research Studies in Life Science

Dr. Thilagamani S
2019 International Journal of Pharma and Bio Sciences  
A new protocol for distributing the key has been introduced by Vijayakumar etal.  ...  RELATED WORK The Easy SMS protocol ensures secure transmission of SMS for end users communication.  ...  for good wellbeing.  ... 
doi:10.22376/ijpbs/10.sp01/oct/2019.1-142 fatcat:6fc5ghwmjbgrphetiablavajxm

Leveraging Machine Learning and Big Data for Smart Buildings: A Comprehensive Survey [article]

Basheer Qolomany, Ala Al-Fuqaha, Ajay Gupta, Driss Benhaddou, Safaa Alwajidi, Junaid Qadir, Alvis C. Fong
2019 arXiv   pre-print
Machine learning and big data analytics will undoubtedly play a critical role to enable the delivery of such smart services.  ...  In this paper, we survey the area of smart building with a special focus on the role of techniques from machine learning and big data analytics.  ...  Because of the extensive use of RFID technology, privacy issues arise in data collection; for example, the RFID tags carried by a person may become a unique identifier for that person.  ... 
arXiv:1904.01460v2 fatcat:rz2gsyurkradlkqvfankw3zue4

Leveraging Machine Learning and Big Data for Smart Buildings: A Comprehensive Survey

Basheer Qolomany, Ala Al-Fuqaha, Ajay Gupta, Driss Benhaddou, Safaa Alwajidi, Junaid Qadir, Alvis C. Fong
2019 IEEE Access  
Machine learning and big data analytics will undoubtedly play a critical role to enable the delivery of such smart services.  ...  In this paper, we survey the area of smart building with a special focus on the role of techniques from machine learning and big data analytics.  ...  Because of the extensive use of RFID technology, privacy issues arise in data collection; for example, the RFID tags carried by a person may become a unique identifier for that person.  ... 
doi:10.1109/access.2019.2926642 fatcat:637wvzuezncn5noyfpfzx7w3ve

Epidemic contact tracing with smartphone sensors [article]

Khuong An Nguyen, Zhiyuan Luo, Chris Watkins
2020 arXiv   pre-print
To the best of our knowledge, this paper was one of the first work to propose a combination of smartphone sensors for contact tracing.  ...  To this end, this paper proposes a novel, yet practical smartphone-based contact tracing approach, employing WiFi and acoustic sound for relative distance estimate, in addition to the air pressure and  ...  Acknowledgements The authors are grateful to the three reviewers for their insightful comments that greatly improve this work. This research is partially supported by AstraZeneca.  ... 
arXiv:2006.00046v2 fatcat:hxqqhxgwn5eifedfvwaeupqdha

Chasing the AIDS virus

Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser
2010 Communications of the ACM  
I also thank Tuomas Sandholm for feedback on the kidney exchange section, and David Pennock for feedback on the prediction markets section.  ...  The authors find that, surprisingly, their filter-based gist is rather good at predicting the number of instances of a given object category that might be present in the scene, as well as their likely  ...  Each of the city's 15 garbage-collection trucks was equipped with an RFID reader and when workers emptied any of the tagged bins into the truck, the antenna picked up a unique ID encoded to the bin's tag  ... 
doi:10.1145/1666420.1666440 fatcat:o2qllqh4tzhh5dzgvnjewl52vq
« Previous Showing results 1 — 15 out of 73 results