A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Evolution of RFID Security
2006
IEEE pervasive computing
ast@cs.vu.nl; www.cs.vu.nl/~ast. www.computer.org/internet/ Stay on Track IEEE Internet Computing reports emerging tools, technologies, and applications implemented through the Internet to support a worldwide ...
The proportion between active and passive tags is also changing; IFF and early RFID systems used mostly active tags, while most modern applications use passive RFID tags. Application characteristics. ...
In the original military RFID systems, there was a clear delineation between attackers and defenders. ...
doi:10.1109/mprv.2006.17
fatcat:wn5xa6nxkfgplhntitbbm4lxdq
Security for 5G Mobile Wireless Networks
2018
IEEE Access
The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. ...
Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided ...
Eavesdropping is a passive attack as the normal communication is not affected by eavesdropping, as shown in Fig. 5a . Due to the passive nature, eavesdropping is hard to detect. ...
doi:10.1109/access.2017.2779146
fatcat:yjroccchnbbzbmmlmug4q7ge4q
Attacks and Defenses in Short-Range Wireless Technologies for IoT
2020
IEEE Access
In this paper, we provide a survey of attacks related to the wireless infrastructures of IoT in general, and to the most used short-range wireless communication technologies in the resource-constrained ...
To achieve the security goals in the wireless infrastructures of IoT, it is crucial to have a comprehensive understanding of IoT attacks, their classification, and security solutions in such infrastructures ...
Commercially, there are two types of RFID-tags, namely, passive and active RFID-tags. ...
doi:10.1109/access.2020.2993553
fatcat:jtcl7llvy5crjaktwmvchlmcxa
A survey of IoT security threats and defenses
2019
International Journal of Advanced Computer Research
In this paper, we address different security challenges, threats, and defenses in the layers of IoT systems. ...
The IoT system is considered one of the most important technologies in recent decades, and the focus of attention in many fields including healthcare, industry, agriculture, military applications, and ...
Conflicts of interest The authors have no conflicts of interest to declare. ...
doi:10.19101/ijacr.2019.940088
fatcat:wt3yxyezpvd2vcoictluggdei4
A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses
[article]
2020
arXiv
pre-print
We present a detailed survey of different potential attacks and discuss their impacts. ...
In this paper, we explore various security and privacy threats to healthcare systems and discuss the consequences of these threats. ...
Passive attacks refer to an attack that performs malicious activities in a healthcare system without obstructing the normal operation of the system, whereas active attacks obstruct the normal operation ...
arXiv:2005.07359v1
fatcat:lomlyc27gbgeteoug3gzlgnqd4
BackProx: Secure Backscatter-Assisted Proximity Detection for Passive Keyless Entry and Start Systems
2023
Sensors
A passive keyless entry and start (PKES) system is an electronic lock for an automobile that provides the great convenience of opening the door when the user is in proximity. ...
However, the system suffers from relay attacks. Recent studies revealed that relayed signals result in valid packets that are sufficient to unlock doors. ...
System Model Suppose we have a PKES system with a passive RFID-based key fob. ...
doi:10.3390/s23042330
pmid:36850928
pmcid:PMC9958540
fatcat:52ergdyydrejnogwojzv3zet5y
Security and Privacy Protection in Visual Sensor Networks
2014
ACM Computing Surveys
In this survey, we present an overview of the characteristics of VSN applications, the involved security threats and attack scenarios, and the major security challenges. ...
Humans are perfectly trained to grasp and process this type of information. Therefore, protection of data against insiders, such as system operators, is especially important in VSNs. ...
ACKNOWLEDGMENTS This work was performed as part of the project TrustEYE: Trustworthy Sensing and Cooperation in Visual Sensor Networks. 2 The work was supported by funding from the European Regional Development ...
doi:10.1145/2545883
fatcat:hkqdjt3ykvhtrp3vc3ce5mzd5m
Design and Implementation of a Low-Cost Universal RFID Wireless Logistics Terminal in the Process of Logistics Traceability
2021
Journal of Sensors
On the basis of determining the overall system plan, this paper designs and develops the UHF RFID reader system and traceability system platform. ...
In terms of software, through the research and analysis of the EPC Class-1 Generation-2 protocol standard, the multitag anticollision algorithm—Q algorithm—is adopted. ...
First, this article uses traditional analysis methods to point out the existence of tag and reader counterfeiting attacks and tracking attacks in the SRSFP protocol. ...
doi:10.1155/2021/9755258
fatcat:zcn2vqb7fnbjdmueswyba5ufpa
Bluetooth Protocol in Internet of Things (IoT), Security Challenges and a Comparison with Wi-Fi Protocol: A Review
2016
International Journal of Engineering Research and
The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active ...
It addresses an overview of the technologies in terms of services. ...
Attack type Attack clasification Purpose Traffic Analysis Confidentiality The Attacker determines the overall network activity e,g Netstumbler Eavesdropping Confidentiality gain access to the network traffic ...
doi:10.17577/ijertv5is110266
fatcat:6opwnte7vndgrdihnv25y4xyim
A proposal for utilising active jamming for the defence of RFID systems against attack
2011
With a range of documented attacks against RFID systems a majority of the current literature is focused on the encryption of the communication. ...
This paper addresses such attacks by proposing alternative means of protection through utilising some of the same methods that may be used to attack these systems. ...
THE THREAT OF ATTACK The discarding of used RFID tags in passive based EPC Class One RFID systems may be seen as a normal part of a tags lifecycle (Hunt, Puglia & Puglia, 2007) . ...
doi:10.4225/75/57b52c81cd8b7
fatcat:bvfke2wf6zci3merakpsffqa6i
Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges
2020
IEEE Communications Surveys and Tutorials
However, while the most promising solutions are turning into valuable commercial products, acoustic channels are increasingly used also to launch attacks against systems and devices, leading to security ...
Finally, we provide open research issues in the context of short-range audio channels security, calling for contributions from both academia and industry. ...
The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF. ...
doi:10.1109/comst.2020.2969030
fatcat:26sskdeh3faaxmyu32iidlxbp4
Drone and Controller Detection and Localization: Trends and Challenges
2022
Applied Sciences
The paper also highlights the features and limitations of the UAV detection systems and briefly surveys the UAV remote controller detection methods. ...
Unmanned aerial vehicles (UAVs) have emerged as a rapidly growing technology seeing unprecedented adoption in various application sectors due to their viability and low cost. ...
After discussing the high-level architecture of UAVs and security concerns, a comprehensive review of radio frequency, radar, acoustic, electro-optic, and hybrid systems for UAV detection is presented. ...
doi:10.3390/app122412612
fatcat:g7ra3enth5ckjkfhukrttm75my
Deployment and Implementation Aspects of Radio Frequency Fingerprinting in Cybersecurity of Smart Grids
2023
Electronics
The characteristics of a deep learning (DL)-aided RFF system are presented. Subsequently, a deployment framework of RFF for smart grids is presented with implementation and regulatory aspects. ...
Smart grids incorporate diverse power equipment used for energy optimization in intelligent cities. This equipment may use Internet of Things (IoT) devices and services in the future. ...
Acknowledgments: This work was supported in part by Gazi University under grant FGA-2022-8043.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics12244914
fatcat:djlc2vhawjgx3hf5s7nxktvpby
A Survey of Wireless Sensor Network Attacks
2017
Communications on Applied Electronics
The purpose of this paper is to study the security attacks and the defense mechanism over WSN. Trust Management will be clarified and its importance in security. ...
There are a lot of application using wireless sensor network, including using in enemy environment. One of the most valuable issues in any WSN is security. ...
Two categories of attacks identified traffic analysis in WSNs: rate monitoring attack, and time correlation attack. ...
doi:10.5120/cae2017652565
fatcat:sauvvrywoncpliym42gkhye6om
Internet of Things Security: Layered classification of attacks and possible Countermeasures
unpublished
In this paper, we endeavour to introduce a new classification of attacks in compliance with the OSI layers and the objective of security that we seek to attained in order to develop novel techniques and ...
Abstract Internet of Things is undoubtedly a well-known research area. In fact, ensuring security of data exchange is among the great challenges of the Internet of things. ...
Basically attacks are classified as active and passive attacks. Examples of passive attacks include monitor and eavesdropping, Traffic analysis, camouflage adversaries, etc. ...
fatcat:o54sc5yebvhkhdzzkvcezaczxe
« Previous
Showing results 1 — 15 out of 34 results