Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








34 Hits in 5.3 sec

The Evolution of RFID Security

M.R. Rieback, B. Crispo, A.S. Tanenbaum
2006 IEEE pervasive computing  
ast@cs.vu.nl; www.cs.vu.nl/~ast. www.computer.org/internet/ Stay on Track IEEE Internet Computing reports emerging tools, technologies, and applications implemented through the Internet to support a worldwide  ...  The proportion between active and passive tags is also changing; IFF and early RFID systems used mostly active tags, while most modern applications use passive RFID tags. Application characteristics.  ...  In the original military RFID systems, there was a clear delineation between attackers and defenders.  ... 
doi:10.1109/mprv.2006.17 fatcat:wn5xa6nxkfgplhntitbbm4lxdq

Security for 5G Mobile Wireless Networks

Dongfeng Fang, Yi Qian, Rose Qingyang Hu
2018 IEEE Access  
The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized.  ...  Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided  ...  Eavesdropping is a passive attack as the normal communication is not affected by eavesdropping, as shown in Fig. 5a . Due to the passive nature, eavesdropping is hard to detect.  ... 
doi:10.1109/access.2017.2779146 fatcat:yjroccchnbbzbmmlmug4q7ge4q

Attacks and Defenses in Short-Range Wireless Technologies for IoT

Karim Lounis, Mohammad Zulkernine
2020 IEEE Access  
In this paper, we provide a survey of attacks related to the wireless infrastructures of IoT in general, and to the most used short-range wireless communication technologies in the resource-constrained  ...  To achieve the security goals in the wireless infrastructures of IoT, it is crucial to have a comprehensive understanding of IoT attacks, their classification, and security solutions in such infrastructures  ...  Commercially, there are two types of RFID-tags, namely, passive and active RFID-tags.  ... 
doi:10.1109/access.2020.2993553 fatcat:jtcl7llvy5crjaktwmvchlmcxa

A survey of IoT security threats and defenses

Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid, Heba K. Aslan
2019 International Journal of Advanced Computer Research  
In this paper, we address different security challenges, threats, and defenses in the layers of IoT systems.  ...  The IoT system is considered one of the most important technologies in recent decades, and the focus of attention in many fields including healthcare, industry, agriculture, military applications, and  ...  Conflicts of interest The authors have no conflicts of interest to declare.  ... 
doi:10.19101/ijacr.2019.940088 fatcat:wt3yxyezpvd2vcoictluggdei4

A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses [article]

AKM Iqridar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac
2020 arXiv   pre-print
We present a detailed survey of different potential attacks and discuss their impacts.  ...  In this paper, we explore various security and privacy threats to healthcare systems and discuss the consequences of these threats.  ...  Passive attacks refer to an attack that performs malicious activities in a healthcare system without obstructing the normal operation of the system, whereas active attacks obstruct the normal operation  ... 
arXiv:2005.07359v1 fatcat:lomlyc27gbgeteoug3gzlgnqd4

BackProx: Secure Backscatter-Assisted Proximity Detection for Passive Keyless Entry and Start Systems

Hoorin Park, Jeongkyu Hong
2023 Sensors  
A passive keyless entry and start (PKES) system is an electronic lock for an automobile that provides the great convenience of opening the door when the user is in proximity.  ...  However, the system suffers from relay attacks. Recent studies revealed that relayed signals result in valid packets that are sufficient to unlock doors.  ...  System Model Suppose we have a PKES system with a passive RFID-based key fob.  ... 
doi:10.3390/s23042330 pmid:36850928 pmcid:PMC9958540 fatcat:52ergdyydrejnogwojzv3zet5y

Security and Privacy Protection in Visual Sensor Networks

Thomas Winkler, Bernhard Rinner
2014 ACM Computing Surveys  
In this survey, we present an overview of the characteristics of VSN applications, the involved security threats and attack scenarios, and the major security challenges.  ...  Humans are perfectly trained to grasp and process this type of information. Therefore, protection of data against insiders, such as system operators, is especially important in VSNs.  ...  ACKNOWLEDGMENTS This work was performed as part of the project TrustEYE: Trustworthy Sensing and Cooperation in Visual Sensor Networks. 2 The work was supported by funding from the European Regional Development  ... 
doi:10.1145/2545883 fatcat:hkqdjt3ykvhtrp3vc3ce5mzd5m

Design and Implementation of a Low-Cost Universal RFID Wireless Logistics Terminal in the Process of Logistics Traceability

Xiaosheng Yu, Zhili Wang, Guolong Shi
2021 Journal of Sensors  
On the basis of determining the overall system plan, this paper designs and develops the UHF RFID reader system and traceability system platform.  ...  In terms of software, through the research and analysis of the EPC Class-1 Generation-2 protocol standard, the multitag anticollision algorithm—Q algorithm—is adopted.  ...  First, this article uses traditional analysis methods to point out the existence of tag and reader counterfeiting attacks and tracking attacks in the SRSFP protocol.  ... 
doi:10.1155/2021/9755258 fatcat:zcn2vqb7fnbjdmueswyba5ufpa

Bluetooth Protocol in Internet of Things (IoT), Security Challenges and a Comparison with Wi-Fi Protocol: A Review

Mukhtar Ahmad Sofi
2016 International Journal of Engineering Research and  
The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active  ...  It addresses an overview of the technologies in terms of services.  ...  Attack type Attack clasification Purpose Traffic Analysis Confidentiality The Attacker determines the overall network activity e,g Netstumbler Eavesdropping Confidentiality gain access to the network traffic  ... 
doi:10.17577/ijertv5is110266 fatcat:6opwnte7vndgrdihnv25y4xyim

A proposal for utilising active jamming for the defence of RFID systems against attack

Christopher Bolan
2011
With a range of documented attacks against RFID systems a majority of the current literature is focused on the encryption of the communication.  ...  This paper addresses such attacks by proposing alternative means of protection through utilising some of the same methods that may be used to attack these systems.  ...  THE THREAT OF ATTACK The discarding of used RFID tags in passive based EPC Class One RFID systems may be seen as a normal part of a tags lifecycle (Hunt, Puglia & Puglia, 2007) .  ... 
doi:10.4225/75/57b52c81cd8b7 fatcat:bvfke2wf6zci3merakpsffqa6i

Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges

Maurantonio Caprolu, Savio Sciancalepore, Roberto Di Pietro
2020 IEEE Communications Surveys and Tutorials  
However, while the most promising solutions are turning into valuable commercial products, acoustic channels are increasingly used also to launch attacks against systems and devices, leading to security  ...  Finally, we provide open research issues in the context of short-range audio channels security, calling for contributions from both academia and industry.  ...  The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF.  ... 
doi:10.1109/comst.2020.2969030 fatcat:26sskdeh3faaxmyu32iidlxbp4

Drone and Controller Detection and Localization: Trends and Challenges

Jawad Yousaf, Huma Zia, Marah Alhalabi, Maha Yaghi, Tasnim Basmaji, Eiman Al Shehhi, Abdalla Gad, Mohammad Alkhedher, Mohammed Ghazal
2022 Applied Sciences  
The paper also highlights the features and limitations of the UAV detection systems and briefly surveys the UAV remote controller detection methods.  ...  Unmanned aerial vehicles (UAVs) have emerged as a rapidly growing technology seeing unprecedented adoption in various application sectors due to their viability and low cost.  ...  After discussing the high-level architecture of UAVs and security concerns, a comprehensive review of radio frequency, radar, acoustic, electro-optic, and hybrid systems for UAV detection is presented.  ... 
doi:10.3390/app122412612 fatcat:g7ra3enth5ckjkfhukrttm75my

Deployment and Implementation Aspects of Radio Frequency Fingerprinting in Cybersecurity of Smart Grids

Maaz Ali Awan, Yaser Dalveren, Ferhat Ozgur Catak, Ali Kara
2023 Electronics  
The characteristics of a deep learning (DL)-aided RFF system are presented. Subsequently, a deployment framework of RFF for smart grids is presented with implementation and regulatory aspects.  ...  Smart grids incorporate diverse power equipment used for energy optimization in intelligent cities. This equipment may use Internet of Things (IoT) devices and services in the future.  ...  Acknowledgments: This work was supported in part by Gazi University under grant FGA-2022-8043. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics12244914 fatcat:djlc2vhawjgx3hf5s7nxktvpby

A Survey of Wireless Sensor Network Attacks

Ahmed S., Salah E., Ayman EL-Sayed
2017 Communications on Applied Electronics  
The purpose of this paper is to study the security attacks and the defense mechanism over WSN. Trust Management will be clarified and its importance in security.  ...  There are a lot of application using wireless sensor network, including using in enemy environment. One of the most valuable issues in any WSN is security.  ...  Two categories of attacks identified traffic analysis in WSNs: rate monitoring attack, and time correlation attack.  ... 
doi:10.5120/cae2017652565 fatcat:sauvvrywoncpliym42gkhye6om

Internet of Things Security: Layered classification of attacks and possible Countermeasures

Otmane Mouaatamid, Mohammed Lahmer, Mostafa Belkasmi
unpublished
In this paper, we endeavour to introduce a new classification of attacks in compliance with the OSI layers and the objective of security that we seek to attained in order to develop novel techniques and  ...  Abstract Internet of Things is undoubtedly a well-known research area. In fact, ensuring security of data exchange is among the great challenges of the Internet of things.  ...  Basically attacks are classified as active and passive attacks. Examples of passive attacks include monitor and eavesdropping, Traffic analysis, camouflage adversaries, etc.  ... 
fatcat:o54sc5yebvhkhdzzkvcezaczxe
« Previous Showing results 1 — 15 out of 34 results