770 Hits in 7.7 sec

Intelligent Agent Based RFID System for on Demand Bus Scheduling and Ticketing

Paul Hamilton, Suresh Sankaranarayanan
2013 International Journal of Future Computer and Communication  
Research has also been carried out on tracking passengers possessing RFID enabled Smart card and store in central locations for future viewing if need be, which a privacy concern is really.  ...  In addition research is being conducted in using mobile agents with RFID technology towards passenger demand and carrying capacity.  ...  In another research application of electronic payments, proxy re-encryption and anonymity to the problem of privacy in public transportation systems that employ electronic ticketing has been mentioned.  ... 
doi:10.7763/ijfcc.2013.v2.194 fatcat:w5gvlyf7yngg5dcuewgc6hotca

A Privacy-Preserving Pay-by-Phone Parking System

Ricard Garra, Santi Martinez, Francesc Sebe
2017 IEEE Transactions on Vehicular Technology  
In this paper we propose a system to pay for parking by phone which preserves the privacy of drivers in the sense that the information managed by the system is proven not to help an attacker with full  ...  The traditional way, based on moving to a pay station and placing the issued parking ticket on the dashboard of the car, presents several drawbacks like having to predict in advance the duration of parking  ...  Privacy in car technology The European Union directive 2010/40/EU (7 July 2010) defines Intelligent Transportation Systems (ITS) as advanced applications which, without embodying intelligence as such,  ... 
doi:10.1109/tvt.2016.2634785 fatcat:indq54xsbza4bcg5tgnd4ej3ou

Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience

Stephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen
2004 Conference on Privacy, Security and Trust  
In this paper, we present a model of the lifecycle of RFID tags used in the retail sector and identify the different actors who may interact with a tag.  ...  We suggest that the in-store problem is more related to lack of privacy solutions for the consumer himself than for the RFID.  ...  Section 3 describes our proposal for zero-knowledge device authentication, which solves the privacy problem in RFID systems.  ... 
dblp:conf/pst/EngbergHJ04 fatcat:vqouoruarjgu3dtz7jenmqp77e

Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns

Fatma Alshohoumi, Mohammed Sarrab, Abdulla AlHamadani, Dawood Al-Abri
2019 International Journal of Advanced Computer Science and Applications  
As it is in its infancy, IoT is surrounded by numerous security and privacy concerns.  ...  IoT refers to a collection of sensors or object in the universe with the capability of communicating with each other through the internet without human intervention.  ...  RESEARCH DIRECTION Efforts must be devoted to integrating privacy preservation mechanisms when designing an IoT architecture, with the aim of preserving the privacy of users on one side and providing quality  ... 
doi:10.14569/ijacsa.2019.0100733 fatcat:xatujd6dqfhitczjm6wzugipyq

Pervasive computing goes the last hundred feet with rfid systems

V. Stanford
2003 IEEE pervasive computing  
Pervasive Computing and Communications Orlando, Florida, March 14-17, 2004 Co-sponsors: Pervasive computing architectures and SystemsIntelligent devices and smart environments  ...  As a caution, however, experience to date suggests that we must design these systems with features that preserve privacy.  ... 
doi:10.1109/mprv.2003.1203746 fatcat:epb352li7ze3roz3v2ci3a6qwq

A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis

Hichem Mrabet, Sana Belguith, Adeeb Alhomoud, Abderrazak Jemai
2020 Sensors  
applications in digital healthcare.  ...  In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers.  ...  In 5G applications communication systems and beyond, BC can enhance spectral efficiency and provide much better 5G traffic optimization while preserving privacy when different IoT devices share a link  ... 
doi:10.3390/s20133625 pmid:32605178 pmcid:PMC7374330 fatcat:rk52vsqrrzd2hebt2xddhrdt54

Deployment of IoT based smart environment : key issues and challenges

Deepti Sehrawat, Nasib Singh Gill
2018 International Journal of Engineering & Technology  
IoT architecture explains function of each layer with respect to the technologies and the devices that surround each layer. Each layer has its specific security issues.  ...  Information security, data protection, and user's privacy are among important key areas in IoT.  ...  NFC devices are used in contactless payment systems, similar to those used in credit cards and electronic ticket smartcards and allow mobile payment to replace/supplement these systems.  ... 
doi:10.14419/ijet.v7i2.9504 fatcat:6pi67dogxncdbniu5wgl7qy4da

Smartphone: The Ultimate IoT and IoE Device [chapter]

Mehdia Ajana El Khaddar, Mohammed Boulmalf
2017 Smartphones from an Applied Research Perspective  
We also provide a concise overview of future opportunities and challenges in IoT and IoE environments and focus more on the security and privacy threats of using the smartphone in IoT and IoE networks  ...  In this chapter, we provide a comprehensive survey on IoT and IoE technologies, their application domains, IoT structure and architecture, the use of smartphones in IoT and IoE, and the difference between  ...  Other systems such as transport vehicle monitoring system based on IoT in [43] uses GPS, RFID, and 3G/4G technologies to monitor and administer the status of goods in real time [43] .  ... 
doi:10.5772/intechopen.69734 fatcat:jft5szpcqfggzhh4r5icjgwdbq

Optimized Conditional Privacy Preservation Protocol for NFC Applications using Genetic Algorithm

Baldeep Singh, Arvind Rajput, Sabhyata Sabhyata
2014 International Journal of Computer Applications  
In the recent years the NFC with the combination of smart devices has widened the utilization range of NFC.  ...  It is said it will replace the credit card in electronic payment so security is one of the area that is to be checked.  ...  The merging of cellular telephony and RFID will bring along a wealth of new application along with it.  ... 
doi:10.5120/17841-8733 fatcat:3bfat5kxovbxzhdh2cp23upaki

Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges

Ahmed Aliyu, Abdul Hanan Abdullah, Omprakash Kaiwartya, Yue Cao, Mohammed Joda Usman, Sushil Kumar, D. K. Lobiyal, Ram Shringar Raw
2017 IETE Technical Review  
The framework of CC-V improves the usability, reliability and efficiency of intelligent transportation system applications [7] .  ...  Whaiduzzaman et al. [14] has explored VCC by presenting a taxonomy based on strategic management, security and privacy, cloud formations, inter-cloud communication and applications issues.  ...  ACKNOWLEDGMENT The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER  ... 
doi:10.1080/02564602.2017.1342572 fatcat:ooyjke73gzedvi7wugizvim4km

High-Power Proxies for Enhancing RFID Privacy and Utility [chapter]

Ari Juels, Paul Syverson, Dan Bailey
2006 Lecture Notes in Computer Science  
Researchers have proposed several types of external devices of moderateto-high computational ability that interact with RFID devices with the aim of protecting user privacy.  ...  In this paper, we propose a new design principle for a personal RFID-privacy device. We refer to such a device as a REP (RFID Enhancer Proxy).  ...  As RFID tags are passive devices and therefore not wholly reliable communicators, a REP can improve the reliability of communications with an RFID system by acting as a proxy for RFID tags.  ... 
doi:10.1007/11767831_14 fatcat:hcse4w3r7nhz3amjwtfu5c2nx4

A Review on IoT - Technology, Application, Architecture, Services

Mohammed Anwaruddin, Mohd. Abdul Sattar, Mohd. Anas Ali
2017 IJARCCE  
Things systems and applications.  User-centric solutions to define IoT collaborative process.  Innovative IoT Solutions for handicapped persons.  Smart things and RFID/NFC communications.  Intelligent  ...  systems based on connected vehicles.  Smart things networks for real world data management.  Practical experiences in Smart cities, large-scale IoT systems.  Opportunistic IoT, based on opportunistic  ...  Vehicular communication system is developed as a part of Intelligent Transport System (ITS).  ... 
doi:10.17148/ijarcce.2017.6326 fatcat:xnxwu5zokbcd3oilk3oxfnsmna

SCADA System Cyber Security [chapter]

Igor Nai Fovino
2013 Secure Smart Embedded Devices, Platforms and Applications  
His scientific interests lie in the areas of public-key infrastructures, embedded systems, e-government services, authentication systems, smart cards, electronic payment systems and security  ...  Last, but certainly not least, we must thank Raja Naem Akram for his tremendous efforts in helping to bring this book to print and to Sheila Cobourne for proof reading on an epic scale.  ...  There his work was focused on NFC/RFID based applications as well as security and privacy in such systems.  ... 
doi:10.1007/978-1-4614-7915-4_20 fatcat:xhfree5esffihhwwxrtpm2i25u

A Computational Architecture Based on RFID Sensors for Traceability in Smart Cities

Higinio Mora-Mora, Virgilio Gilart-Iglesias, David Gil, Alejandro Sirvent-Llamas
2015 Sensors  
This knowledge will be useful in moving towards the design of smart cities in which decision support on transport strategies, business evaluation or initiatives in the tourism sector will be supported  ...  In order to accomplish these tasks, we propose the design of a smart sensor network based on RFID communication technologies, reliability patterns and integration techniques.  ...  Author Contributions All authors were involved in the foundation items. All authors wrote the paper and read and approved the final manuscript.  ... 
doi:10.3390/s150613591 pmid:26067195 pmcid:PMC4507584 fatcat:okcpjttvjzapzl2cj5sscbdstq

A Utility Paradigm and Roadmap of Internet-of-Things in Thailand for Digital Economy Development towards ASEAN Economic Community

Jeerana Noymanee, Wimol San-Um, Thanaruk Theeramunkong
2016 Proceedings of the International Conference on Internet of Things and Big Data  
In accordance to Thai environments and possible application platforms, the current status of IoT is described in terms of Internet-of-Device (IoO), Internet-of-Service (IoS), Internet-of-People (IoP),  ...  and Internet-of-Intelligence (IoI).  ...  The major applications are mobile payment in retails and touch-up fares on the BTS (Sky train transportation) and MRT (Underground Transportation).  ... 
doi:10.5220/0005893700360046 dblp:conf/iotbd/NoymaneeST16 fatcat:suuqsi6t65aljpueutveebmfvq
« Previous Showing results 1 — 15 out of 770 results