A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Intelligent Agent Based RFID System for on Demand Bus Scheduling and Ticketing
2013
International Journal of Future Computer and Communication
Research has also been carried out on tracking passengers possessing RFID enabled Smart card and store in central locations for future viewing if need be, which a privacy concern is really. ...
In addition research is being conducted in using mobile agents with RFID technology towards passenger demand and carrying capacity. ...
In another research application of electronic payments, proxy re-encryption and anonymity to the problem of privacy in public transportation systems that employ electronic ticketing has been mentioned. ...
doi:10.7763/ijfcc.2013.v2.194
fatcat:w5gvlyf7yngg5dcuewgc6hotca
A Privacy-Preserving Pay-by-Phone Parking System
2017
IEEE Transactions on Vehicular Technology
In this paper we propose a system to pay for parking by phone which preserves the privacy of drivers in the sense that the information managed by the system is proven not to help an attacker with full ...
The traditional way, based on moving to a pay station and placing the issued parking ticket on the dashboard of the car, presents several drawbacks like having to predict in advance the duration of parking ...
Privacy in car technology The European Union directive 2010/40/EU (7 July 2010) defines Intelligent Transportation Systems (ITS) as advanced applications which, without embodying intelligence as such, ...
doi:10.1109/tvt.2016.2634785
fatcat:indq54xsbza4bcg5tgnd4ej3ou
Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience
2004
Conference on Privacy, Security and Trust
In this paper, we present a model of the lifecycle of RFID tags used in the retail sector and identify the different actors who may interact with a tag. ...
We suggest that the in-store problem is more related to lack of privacy solutions for the consumer himself than for the RFID. ...
Section 3 describes our proposal for zero-knowledge device authentication, which solves the privacy problem in RFID systems. ...
dblp:conf/pst/EngbergHJ04
fatcat:vqouoruarjgu3dtz7jenmqp77e
Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns
2019
International Journal of Advanced Computer Science and Applications
As it is in its infancy, IoT is surrounded by numerous security and privacy concerns. ...
IoT refers to a collection of sensors or object in the universe with the capability of communicating with each other through the internet without human intervention. ...
RESEARCH DIRECTION Efforts must be devoted to integrating privacy preservation mechanisms when designing an IoT architecture, with the aim of preserving the privacy of users on one side and providing quality ...
doi:10.14569/ijacsa.2019.0100733
fatcat:xatujd6dqfhitczjm6wzugipyq
Pervasive computing goes the last hundred feet with rfid systems
2003
IEEE pervasive computing
Pervasive Computing and Communications
Orlando, Florida, March 14-17, 2004
http://www.PerCom.org
Co-sponsors: Pervasive computing architectures and Systems
•
Intelligent devices and smart environments ...
As a caution, however, experience to date suggests that we must design these systems with features that preserve privacy. ...
doi:10.1109/mprv.2003.1203746
fatcat:epb352li7ze3roz3v2ci3a6qwq
A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis
2020
Sensors
applications in digital healthcare. ...
In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. ...
In 5G applications communication systems and beyond, BC can enhance spectral efficiency and provide much better 5G traffic optimization while preserving privacy when different IoT devices share a link ...
doi:10.3390/s20133625
pmid:32605178
pmcid:PMC7374330
fatcat:rk52vsqrrzd2hebt2xddhrdt54
Deployment of IoT based smart environment : key issues and challenges
2018
International Journal of Engineering & Technology
IoT architecture explains function of each layer with respect to the technologies and the devices that surround each layer. Each layer has its specific security issues. ...
Information security, data protection, and user's privacy are among important key areas in IoT. ...
NFC devices are used in contactless payment systems, similar to those used in credit cards and electronic ticket smartcards and allow mobile payment to replace/supplement these systems. ...
doi:10.14419/ijet.v7i2.9504
fatcat:6pi67dogxncdbniu5wgl7qy4da
Smartphone: The Ultimate IoT and IoE Device
[chapter]
2017
Smartphones from an Applied Research Perspective
We also provide a concise overview of future opportunities and challenges in IoT and IoE environments and focus more on the security and privacy threats of using the smartphone in IoT and IoE networks ...
In this chapter, we provide a comprehensive survey on IoT and IoE technologies, their application domains, IoT structure and architecture, the use of smartphones in IoT and IoE, and the difference between ...
Other systems such as transport vehicle monitoring system based on IoT in [43] uses GPS, RFID, and 3G/4G technologies to monitor and administer the status of goods in real time [43] . ...
doi:10.5772/intechopen.69734
fatcat:jft5szpcqfggzhh4r5icjgwdbq
Optimized Conditional Privacy Preservation Protocol for NFC Applications using Genetic Algorithm
2014
International Journal of Computer Applications
In the recent years the NFC with the combination of smart devices has widened the utilization range of NFC. ...
It is said it will replace the credit card in electronic payment so security is one of the area that is to be checked. ...
The merging of cellular telephony and RFID will bring along a wealth of new application along with it. ...
doi:10.5120/17841-8733
fatcat:3bfat5kxovbxzhdh2cp23upaki
Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges
2017
IETE Technical Review
The framework of CC-V improves the usability, reliability and efficiency of intelligent transportation system applications [7] . ...
Whaiduzzaman et al. [14] has explored VCC by presenting a taxonomy based on strategic management, security and privacy, cloud formations, inter-cloud communication and applications issues. ...
ACKNOWLEDGMENT The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER ...
doi:10.1080/02564602.2017.1342572
fatcat:ooyjke73gzedvi7wugizvim4km
High-Power Proxies for Enhancing RFID Privacy and Utility
[chapter]
2006
Lecture Notes in Computer Science
Researchers have proposed several types of external devices of moderateto-high computational ability that interact with RFID devices with the aim of protecting user privacy. ...
In this paper, we propose a new design principle for a personal RFID-privacy device. We refer to such a device as a REP (RFID Enhancer Proxy). ...
As RFID tags are passive devices and therefore not wholly reliable communicators, a REP can improve the reliability of communications with an RFID system by acting as a proxy for RFID tags. ...
doi:10.1007/11767831_14
fatcat:hcse4w3r7nhz3amjwtfu5c2nx4
A Review on IoT - Technology, Application, Architecture, Services
2017
IJARCCE
Things systems and applications. User-centric solutions to define IoT collaborative process. Innovative IoT Solutions for handicapped persons. Smart things and RFID/NFC communications. Intelligent ...
systems based on connected vehicles. Smart things networks for real world data management. Practical experiences in Smart cities, large-scale IoT systems. Opportunistic IoT, based on opportunistic ...
Vehicular communication system is developed as a part of Intelligent Transport System (ITS). ...
doi:10.17148/ijarcce.2017.6326
fatcat:xnxwu5zokbcd3oilk3oxfnsmna
SCADA System Cyber Security
[chapter]
2013
Secure Smart Embedded Devices, Platforms and Applications
His scientific interests lie in the areas of public-key infrastructures, embedded systems, e-government services, authentication systems, smart cards, electronic payment systems and security ...
Last, but certainly not least, we must thank Raja Naem Akram for his tremendous efforts in helping to bring this book to print and to Sheila Cobourne for proof reading on an epic scale. ...
There his work was focused on NFC/RFID based applications as well as security and privacy in such systems. ...
doi:10.1007/978-1-4614-7915-4_20
fatcat:xhfree5esffihhwwxrtpm2i25u
A Computational Architecture Based on RFID Sensors for Traceability in Smart Cities
2015
Sensors
This knowledge will be useful in moving towards the design of smart cities in which decision support on transport strategies, business evaluation or initiatives in the tourism sector will be supported ...
In order to accomplish these tasks, we propose the design of a smart sensor network based on RFID communication technologies, reliability patterns and integration techniques. ...
Author Contributions All authors were involved in the foundation items. All authors wrote the paper and read and approved the final manuscript. ...
doi:10.3390/s150613591
pmid:26067195
pmcid:PMC4507584
fatcat:okcpjttvjzapzl2cj5sscbdstq
A Utility Paradigm and Roadmap of Internet-of-Things in Thailand for Digital Economy Development towards ASEAN Economic Community
2016
Proceedings of the International Conference on Internet of Things and Big Data
In accordance to Thai environments and possible application platforms, the current status of IoT is described in terms of Internet-of-Device (IoO), Internet-of-Service (IoS), Internet-of-People (IoP), ...
and Internet-of-Intelligence (IoI). ...
The major applications are mobile payment in retails and touch-up fares on the BTS (Sky train transportation) and MRT (Underground Transportation). ...
doi:10.5220/0005893700360046
dblp:conf/iotbd/NoymaneeST16
fatcat:suuqsi6t65aljpueutveebmfvq
« Previous
Showing results 1 — 15 out of 770 results