Filters








4,746 Hits in 3.8 sec

A Survey of Security in Internet of Things – Importance and Solutions

Javeria Ambareen, Pritam Gajkumar Shah, M. Prabhakar
2016 Indian Journal of Science and Technology  
This comes with a huge responsibility, that of securing all the communications, data and participating things. Method: Surveys and comparative studies are used for understanding the security in IoT.  ...  Internet of Things (IoT) has the potential for societal, environmental as well as economic impact.  ...  The tags in a RFID system consist of an Integrated circuit with memory for computing and an antenna for transmitting and receiving signals.  ... 
doi:10.17485/ijst/2016/v9i45/106489 fatcat:72z2a6hlv5goxmfrjtkafbpfoe

Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks

Wiem Tounsi, Joaquin Garcia-Alfaro, Nora Cuppens-Boulahia, Frédéric Cuppens
2010 2010 8th Annual Communication Networks and Services Research Conference  
We outline some important aspects that must be guaranteed given the existence of low-cost and resource-constrained RFID components.  ...  We address security solutions to protect the communication of the wireless components of a home health care system.  ...  Conclusions We surveyed some state-of-the-art solutions for deploying secure communications between resource-constrained wireless components of home health care systems.  ... 
doi:10.1109/cnsr.2010.38 dblp:conf/cnsr/TounsiGCC10 fatcat:pispq3aatrh67fj5wc7zwx4jfm

Efficient Key Management System for Large-scale Smart RFID Applications

Mohammad Fal Sadikin, Marcel Kyas
2015 Proceedings of the 1st International Conference on Industrial Networks and Intelligent Systems  
Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system.  ...  Furthermore, most of existing solutions in key management system for wireless communication are highly susceptible to various security and privacy threats.  ...  Thus, such a protocol solution is not suitable for emerging security and privacy threats in the constrained nature smart RFID system.  ... 
doi:10.4108/icst.iniscom.2015.258316 dblp:journals/ew/SadikinK15 fatcat:t2ta4cgfebgsfjqplpo73s77ee

Lightweight Security Protocols for Internet of Things: A Review

Deepti Rani, Maharshi Dayanand University, Rohtak, Haryana (India)
2019 International Journal of Advanced Trends in Computer Science and Engineering  
Lightweight cryptography algorithms used for designing lightweight security protocols have also been explored in present paper.  ...  The paper also presents a comparative study of various lightweight security protocols for IoT, proposed by many researchers in recent years.  ...  In 1959, RFID commercial system was originated. First transponder system was originated in 1973. First RFID chip was used in 1979 in objects.  ... 
doi:10.30534/ijatcse/2019/58832019 fatcat:7wtxzomxcnfu7latkr3bl443e4

Security problems of systems of extremely weak devices

Marek Klonowski
2011 Annales UMCS Informatica  
We briefly describe two extreme kinds of such systems -the sensor network and theRadio Frequency IDentification (RFID) system from the point of view of security mechanisms designer.  ...  In this paper we discuss some fundamental security issues of distributed systems of weak devices.  ...  We explain why constructing security mechanisms is so difficult for constrained devices.  ... 
doi:10.2478/v10065-011-0015-6 fatcat:zfdync6ktnaenop7w3m3yuaxfq

CCCP: Secure Remote Storage for Computational RFIDs

Mastooreh Salajegheh, Shane S. Clark, Benjamin Ransford, Kevin Fu, Ari Juels
2009 USENIX Security Symposium  
While radio communication is more energy intensive than flash memory writes in many embedded devices, we show that the reverse is true for passive RFID tags.  ...  CCCP enables secure and flexible remote storage that would otherwise outstrip batteryless RFID tags' resources.  ...  Department of Homeland Security.  ... 
dblp:conf/uss/SalajeghehCRFJ09 fatcat:ewh62s5r5bajfpgk5zweijdh2m

Light-weight Key Management Scheme for Active RFID Applications

Mohammad Fal Sadikin, Marcel Kyas
2015 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system.  ...  This paper introduces novel key management system, tailored to the limited resources of smart RFID system.  ...  Thus, such a protocol solution is not suitable for emerging security and privacy threats in the constrained nature smart RFID system.  ... 
doi:10.4108/eai.17-9-2015.150286 fatcat:6rmzaci4kzbsflpl2v37ifkmem

A Study of Security Vulnerabilities in Mobile environment

Suk-jin Kim, Hyangran Lee, Malrey Lee
2015 The International Journal of Advanced Culture Technology  
Now day's application had focus more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that become important for security.  ...  However, security and privacy issues and risks are introduced by pervasiveness of RFID systems. In RFID systems, communication between tag and reader usually takes place via wireless communication.  ...  ACKNOWLEDGEMENTS This work (Grants No: 1401001175) was supported by Business for Academic-industrial Cooperative establishments funded Korea Small and Medium Business Administration in 2015.  ... 
doi:10.17703/ijact.2015.3.2.149 fatcat:dbf3vgagajf7va4pdxxbkqy4le

RFID Based Smart Lock implementation

2018 Al-Qadisiyah Journal for Engineering Science  
The system is implemented and tested with no need for a sophisticated material but easy equipment may stand enough to achieve the job with very accept able cost.  ...  This lock is not the representative for a key but it may represent a badge, an ID, or a credit card or social security card .... etc.  ...  Identification phase important constrain since the user can be identified if the user inside the system distance range elsewhere the system will not recognize the user RFID card.  ... 
doi:10.30772/qjes.v11i1.526 fatcat:z7vpymbpc5dtlabyn255ymzpm4

A performance comparison of lightweight cryptographic algorithms suitable for IoT transmissions

Jihane Jebrane, Saiida Lazaar
2021 General Letters in Mathematics  
The main goal of the present paper is to highlight the need to provide security systems for IoT applications through lightweight cryptographic mechanisms.  ...  The expressed need is to construct lightweight functions and algorithms suitable for constrained environments including small devices.  ...  RFID systems, and GPS systems, etc.  ... 
doi:10.31559/glm2021.10.2.5 fatcat:l4eux7qk6jdtphmpny3skkexeq

Attacks and Threats on the U-Healthcare Application with Mobile Agent

Jung Tae Kim
2014 International Journal of Security and Its Applications  
Bing Wang, et al., evaluated RFID and Wi-Fi technologies for RTLS (Real time location system) applications in healthcare organization.  ...  But, optimized security protocols and schemes between sensor and patient device are essential for high performance and security problem in U-healthcare system.  ...  a concept of security layer for RFID system.  ... 
doi:10.14257/ijsia.2014.8.4.06 fatcat:q5rxul7u25h7zluc6uc7rjkmza

Security Vulnerabilities in RFID Networks

Junaid Ahsenali Chaudhry, Malrey Lee
2013 International journal of advanced smart convergence  
However, security and privacy issues and risks are introduced by pervasiveness of RFID systems. In RFID systems, communication between tag and reader usually takes place via wireless communication.  ...  Nowaday's application, that is focused more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that became important for security.  ...  It means that security and privacy have always been the main focus for every RFID systems and protocols [1] .  ... 
doi:10.7236/ijasc2013.2.2.7 fatcat:lsynrr4srvcttpdredyqjkh57i

Internet of Things (IoT) Technologies - A Study

Linguberi Sravani
2019 International Journal for Research in Applied Science and Engineering Technology  
Second, the energy consumption of M2M communication network devices is usually constrained. Wireless devices must operate on their own batteries for years instead of days.  ...  Applications are like smart grids for intelligent monitoring, control and efficient delivery ery of electricity to consumers, smart cities, for increasing security, green energy, and intelligent parks,  ... 
doi:10.22214/ijraset.2019.2142 fatcat:6e67d5c46vfzlmr4f5qedpjpjy

LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments

Tai-Hoon Kim, Gulshan Kumar, Rahul Saha, William J. Buchanan, Tannishtha Devgun, Reji Thomas
2021 IEEE Access  
Following this, various light-weight versions of generic security primitives have been developed for IIoT and other resource-constrained sustainability.  ...  We find the suitability of LiSP-XK for IIoT like environments due to its lesser complexity and less energy consumption. Moreover, the signcryption process is also beneficial in enhancing security.  ...  Security controls such as firewalls and intrusion detection systems (IDSs) can be added for security provisions.  ... 
doi:10.1109/access.2021.3097267 fatcat:cybclcx66fduzdan6u4nw2x3la

Internet of Things: A Review on Technologies, Architecture, Challenges, Applications, Future Trends

Jaideep Kaur, Kamaljit Kaur
2017 International Journal of Computer Network and Information Security  
This paper introduces IoT with emphasis on its driver technologies and system architecture.  ...  There are three components that are required for proper functioning of IoT.  ...  DAOT prevents IoT devices from MITM security attacks by leveraging energy aware security strategy. DAOT is cost and energy efficient.  ... 
doi:10.5815/ijcnis.2017.04.07 fatcat:vacjter2gjc6bntygm5jq6fbc4
« Previous Showing results 1 — 15 out of 4,746 results