Добірка наукової літератури з теми "Radio frequency identification systems Security measures"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Radio frequency identification systems Security measures".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Radio frequency identification systems Security measures"
Kang, Jian, Hui Mu, Hui Ren, Jicheng Jia, Lin Qi, and Zherui Zhang. "Electromagnetic Signal Intelligent Identification Based on Radio Frequency Fingerprints." Wireless Communications and Mobile Computing 2022 (June 7, 2022): 1–12. http://dx.doi.org/10.1155/2022/6296954.
Повний текст джерелаLamrani Alaoui, Hasnae, Abdellatif El Ghazi, Mustapha Zbakh, Abdellah Touhafi, and An Braeken. "A Highly Efficient ECC-Based Authentication Protocol for RFID." Journal of Sensors 2021 (July 3, 2021): 1–16. http://dx.doi.org/10.1155/2021/8876766.
Повний текст джерелаRuhil, Ankit, Dr Manjot Kaur Bhatia, and Pooja kumari. "SLIM: A Lightweight Block Cipher for Internet of Health Things." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 370–81. http://dx.doi.org/10.22214/ijraset.2022.47879.
Повний текст джерелаWei, Guo-heng, Yan-lin Qin, and Wei Fu. "An Improved Security Authentication Protocol for Lightweight RFID Based on ECC." Journal of Sensors 2022 (February 8, 2022): 1–6. http://dx.doi.org/10.1155/2022/7516010.
Повний текст джерелаDeMers, Gerard, Christopher Kahn, Per Johansson, Colleen Buono, Octav Chipara, William Griswold, and Theodore Chan. "Secure Scalable Disaster Electronic Medical Record and Tracking System." Prehospital and Disaster Medicine 28, no. 5 (June 26, 2013): 498–501. http://dx.doi.org/10.1017/s1049023x13008686.
Повний текст джерелаGvozdenovic, Nikola, Ralph Prestros, and Christoph F. Mecklenbräuker. "Far-Field Testing Method of Spurious Emission Produced by HF RFID." International Journal of Antennas and Propagation 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/4715898.
Повний текст джерелаOgurtsov, Maxim, Vyacheslav Korolyov, and Oleksandr Khodzinskyi. "To the Problems of the National State Recognition System Improving." Cybernetics and Computer Technologies, no. 2 (September 30, 2022): 74–82. http://dx.doi.org/10.34229/2707-451x.22.2.8.
Повний текст джерелаEl Khamlichi, Mohamed, Alejandro Alvarez Melcon, Otman El Mrabet, Mohammed Ali Ennasar, and Juan Hinojosa. "Flexible UHF RFID Tag for Blood Tubes Monitoring." Sensors 19, no. 22 (November 9, 2019): 4903. http://dx.doi.org/10.3390/s19224903.
Повний текст джерелаAndziulis, Arūnas, Rimantas Plėštys, Sergej Jakovlev, Danielius Adomaitis, Konstantin Gerasimov, Mindaugas Kurmis, and Valdemaras Pareigis. "PRIORITY BASED TAG AUTHENTICATION AND ROUTING ALGORITHM FOR INTERMODAL CONTAINERS RFID SENSOR NETWORK." TRANSPORT 27, no. 4 (December 21, 2012): 373–82. http://dx.doi.org/10.3846/16484142.2012.750622.
Повний текст джерелаLv, Hao, Teng Jiao, Yang Zhang, Fulai Liang, Fugui Qi, and Jianqi Wang. "A Novel Method for Breath Detection via Stepped-Frequency Continuous Wave Ultra-Wideband (SFCW UWB) Radars Based on Operational Bandwidth Segmentation." Sensors 18, no. 11 (November 10, 2018): 3873. http://dx.doi.org/10.3390/s18113873.
Повний текст джерелаДисертації з теми "Radio frequency identification systems Security measures"
Foley, Joseph Timothy 1976. "Security approaches for Radio Frequency Identification systems." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/38710.
Повний текст джерелаIncludes bibliographical references (p. 253-270) and index.
In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain performance and automate asset management. However, an antagonist could use the functionality of the RFID tags and the EPC data to invade personal privacy or acquire access to unauthorized corporate information such as inventory levels. In addition, current RFID mechanisms expose secrets to the readers, which opens an avenue for exploits and information leakage. I examined the RFID security and privacy issues and designed a number of systems to improve tag authentication, privacy protection, and secure sharing of EPC data. The specific solutions I propose include TagCheck to protect tags from counterfeiting, JanusTag to allow recoverable dynamic recoding of tags, TagFolio for privacy policy enforcement, and TagDirective for secret management and access control. To prevent leakage at the application level during Object Name System (ONS) resolution, I propose the use of an anonymizing TorONS system.
(cont.) Lastly, to protect tags from being "mass killed", I designed two different categories of RFID tag kill-resistance mechanisms: active protection using Neighborhood Watch communities of readers and Exponential Rampup for tag self-defense. These technologies are combined under one umbrella called TinFoil, creating a comprehensive security solution that successfully protects the data in an EPC-enabled RFID system while minimizing required modifications to existing architecture.
by Joseph Timothy Foley.
S.M.
Xu, Dongming. "On the testing of the RFID security /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20XU.
Повний текст джерелаYassaei, Mahshid. "Security and privacy analysis of radio frequency identification systems." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=114506.
Повний текст джерелаLes technologies de radio identification (RFID) sont fortement utilisées dans diverses applications qui vont du contrôle d'accès aux systèmes de traçabilité d'objets. L'automatisation et la rapidité accrue des services que ces technologies rendent possibles ont des effets marqués sur notre vie quotidienne. Cependant, les systèmes RFID comportent de nombreux problèmes de sécurité et de protection de la vie privée qui ne sont toujours pas résolus. Au cours des dernières années, de nombreuses attaques ont été conues contre la puce Classic de MIFARE ainsi que la puce iClass d'HID, deux des systèmes RFID les plus répandus sur le marché. Le but de cette étude est d'améliorer les mécanismes de sécurité et de protection de la vie privée des systèmes RFID par le développement d'outils et la méthodologie d'analyse des systèmes, dans l'espoir de découvrir les failles de sécurité potentielles avant que des adversaires ne le fassent. Par exemple, nous avons procédé à une analyse partielle des cartes OPUS (les cartes qui contiennent les titres de transport en commun utilisés à Montréal, qui font usage de la technologie RFID), et mis en évidence de nombreux éléments des spécifications de ces cartes qui représentent une faille de sécurité ou de protection de la vie privée. Nous avons découvert que le numéro d'identification statique de la carte est transmis durant le processus anticollision, ce qui peut être utilisé pour suivre la trace du détenteur de la carte sans son consentement. De plus, des informations concernant les trois dernières utilisations d'une carte (l'heure, la date, et la station de métro ou d'autobus) sont transmis sans être chiffrés, et avant le processus d'authentification n'ait lieu. Seule une conversion linéaire est appliquée sur l'information, et cette conversion peut être inversée par une simple application telle que celle que nous avons développé au cours de cette étude. De plus, nous présentons des modifications visant à améliorer le niveau de sécurité et de protection de la vie privée des systèmes RFID. Nous classons ces modifications sur la base de leur coût et de la gravité des interruptions de service que l'application de ces modifications ferait subir au manufacturier.Mots clés: Systèmes RFID, protection de la vie privée, sécurité, cartes OPUS
Schlesinger, Adam Ian. "Mitigating container security risk using real-time monitoring with active Radio Frequency Identification and sensors." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33353.
Повний текст джерелаIncludes bibliographical references (leaves 57-60).
The global village in which we live enables increased trade and commerce across regions but also brings a complicated new set of challenges such as terrorist activity, human and drug smuggling and theft in foreign or domestic locations. Containers travel the globe, across all seven continents. In the wake of intensified security concerns since the September 11, 2001 attacks, tracking containers and their contents presents an increasing concern for those institutions and personnel charged with ensuring their security. This thesis analyzes the risks associated with global container transport. The concept of an e-container is set forth as a risk mitigation technology that uses real-time monitoring of a container's physical status acquired from an array of embedded RFID-enabled sensors. A framework is suggested that relates sensor-identified signatures and phenomena to behaviors representing breaches in container security. A theoretical model suggests which sensors are required to identify the individual breaches in order to mitigate container security risk.
y Adam Ian Schlesinger.
M.Eng.in Logistics
Sakai, Kazuya. "Security and Privacy in Large-Scale RFID Systems." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1386006971.
Повний текст джерелаBitko, Gordon. "RFID in the retail sector a methodology for analysis of policy proposals and their implications for privacy, economic efficiency and security /." Santa Monica, CA : RAND, 2007. http://www.rand.org/pubs/rgsd_issertations/RGSD209/.
Повний текст джерелаMogiba, Ntombizandile Cynthia. "Utilising radio-frequency identification technologies as knowledge management enablers in academic libraries: a case study of the University of South Africa." Diss., 2018. http://hdl.handle.net/10500/25322.
Повний текст джерелаInformation Science
M. Inf. (Information Science)
Ranasinghe, Damith Chinthana. "New directions in advanced RFID systems." 2007. http://hdl.handle.net/2440/58490.
Повний текст джерелаA combination of Radio Frequency Identification technology and ubiquitous computing are revolutionising the manner in which we look at simple objects. Radio Frequency Identification (RFID) allows RFID labeled objects to be identified at a distance without physical contact, and ubiquitous computing provides a virtually connected environment for the objects. RFID labels are frequently referred to as the next generation barcodes. RFID Systems provide increased productivity, efficiency, convenience and many advantages over bar codes for numerous applications, especially global supply chain management. RFID labeling has a number of advantages over conventional bar code systems. The optics based bar code systems could be rendered useless by common everyday environments containing dirt, dust, smoke, grease, condensation and by misorientation and misalignment. Furthermore bar codes are subject to fraudulent duplication and counterfeiting with minimal effort. However, there are limitations and constraints inherent to RFID technology: semiconductor thresholds, limits on transmitted power, costs, antenna and coupling inefficiencies. Thus it is important for RFID designers to understand these limitations and constraints in order to optimise system designs and overcome inefficiencies where possible. Therefore the work presented in this dissertation seeks to improve the performance of advanced RFID systems by overcoming a number of these limitations. Prior to a discussion of improving performance, the author's interpretation of a modem RFID system along its evolutionary path as a ubiquitous RFID network and its application to supply chain management is described. Performance improvements are achieved by: the development of electromagnetic theory for RFID system analysis and optimisation; design and development of interrogator antennas; analysis of electrically small and tiny antennas for RFID labels; and development and utilisation of a design methodology for creating high performance label antennas and antennas for tagging metallic objects. Implementations of RFID systems have raised concerns regarding information security and possible violations of end-user privacy. The most profound concerns are raised against low cost RFID technology because of its potential for mass scale deployment, its pervasive nature, and the resource limitations preventing the provision of strong cryptographic solutions. There is a growing need in the RFID community to discover and develop techniques and methods to overcome various hurdles posed by the above-mentioned concerns. Thus, the thesis also considers the vulnerabilities of low cost RFID systems and associated insecurities and privacy concerns resulting from the latter. Prior to addressing such concerns impeding the deployment of low cost RFID technology, a framework within which to provide security services is also detailed. It has become important to both defme and identity a framework based around low cost RFID systems since RFID has become a "catch all" phrase for various other forms of technology. Addressing security and privacy of low cost RFID systems requires novel thinking. The later parts of the thesis outline design considerations for security mechanisms and a number of practicable solutions for providing the features of: mutual authentication; confidentiality; message content security; product authentication; anonymity and untraceability, that are necessary for low cost RFID systems to overcome the weaknesses identified in this dissertation. Implementing these security mechanisms requires the generation of true random tag parameters and true random numbers. Achieving these objectives using a hardware based true random number generator is also described and analysed. A final part of the thesis focuses on active RFID labels and improving their performance. The primary concern with active labels is the life of the onboard battery. Turn-on circuits provide a method of turning "on" and "off" an active label remotely to conserve valuable battery power. Analysis, development and testing of a turn-on circuit concept, based on interrogator field sensing, have provided a means of remotely activating and deactivating active RFID labels and conserving battery power. The final chapter of this thesis provides a detailed analysis, based on coupling relations between electromechanical systems, for evaluating the feasibility of a theft detection sensor, based on a turn-on circuit for an active RFID label, for preventing the theft of high value items. While low cost RFID needs to overcome certain security and privacy related barriers, RFID technology does provide novel and valid approaches to such security related applications as product authentication, anti-counterfeiting and theft detection. It is believed that the contributions from this thesis will extend and elaborate on the existing knowledge base, paving the way forward to allow further significant deployment of advanced RFID techno logy.
http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1368084
Thesis (Ph.D.) -- University of Adelaide, School of Electrical and Electronic Engineering, 2007
Muwanguzi, Mark. "Security framework for low cost RFID tags." Thesis, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000289.
Повний текст джерелаRadio Frequency Identification (RFID) systems are becoming more popular today, especially in first world countries. This is a result of the systems wide range of applications. RFID technology is used in several industries, such as: transport, sport, medicine and government institutions. The advantages that the technology offers promote its widespread use and implementation in various industries. RFID systems have the capacity to store more information than other identification technologies (for example barcode technology). Data can be read with ease as it does not require line of sight and human intervention. Despite several implementations in many industries, RFID still has some disadvantages, for instance implementation cost and issues of security and privacy. The focus of this study is the security and privacy issues in the RFID environment.
Mullani, Ally Aziz Jamal. "A strategic assessment of the challenges involved in entering the cargo containers tracking and security market for an RFID company /." 2005. http://ir.lib.sfu.ca/handle/1892/3644.
Повний текст джерелаКниги з теми "Radio frequency identification systems Security measures"
China) RFIDSec (Workshop) (2013 Guangzhou. Radio frequency identification system security: RFIDsec'13 Asia Workshop Proceedings. Amsterdam, Netherlands: IOS Press, 2013.
Знайти повний текст джерелаSingapore), Workshop on RFID Security (2010. Radio frequency identification system security: RFIDsec'10 Asia Workshop proceedings. Amsterdam: IOS Press, 2010.
Знайти повний текст джерелаRFIDsec '11 Asia (2011 Wuxi Shi, China). Radio frequency identification system security: RFIDsec '11 Asia Workshop proceedings. Amsterdam: IOS Press, 2011.
Знайти повний текст джерелаZhang, Yan. Security in RFID and sensor networks. Boca Raton: Auerbach Publications, 2009.
Знайти повний текст джерелаMaking the most of RFID in libraries. London: Facet Pub., 2009.
Знайти повний текст джерелаAdvanced security and privacy for RFID technologies. Hershey, PA: Information Science Reference, 2013.
Знайти повний текст джерелаUnited, States Congress House Committee on Energy and Commerce Subcommittee on Commerce Trade and Consumer Protection. RFID technology: What the future holds for commerce, security, and the consumer : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, second session, July 14, 2004. Washington: U.S. G.P.O., 2004.
Знайти повний текст джерелаTu shu guan RFID yan jiu: A study on RFID application in libraries. Beijing Shi: Guo jia tu shu guan, 2010.
Знайти повний текст джерелаPalmer, Martin. Making the most of RFID in libraries. London: Facet Pub., 2009.
Знайти повний текст джерелаLopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Hershey, PA: Information Science Reference, 2013.
Знайти повний текст джерелаЧастини книг з теми "Radio frequency identification systems Security measures"
Armknecht, Frederik, Liqun Chen, Ahmad-Reza Sadeghi, and Christian Wachsmann. "Anonymous Authentication for RFID Systems." In Radio Frequency Identification: Security and Privacy Issues, 158–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16822-2_14.
Повний текст джерелаKlonowski, Marek, Krzysztof Majcher, Wojciech Macyna, and Filip Zagórski. "Hidden Bits Approach for Authentication in RFID Systems." In Radio Frequency Identification. Security and Privacy Issues, 48–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36140-1_4.
Повний текст джерелаHinterwälder, Gesine, Christof Paar, and Wayne P. Burleson. "Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems." In Radio Frequency Identification. Security and Privacy Issues, 109–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36140-1_8.
Повний текст джерелаWeis, Stephen A., Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems." In Security in Pervasive Computing, 201–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-39881-3_18.
Повний текст джерелаGurumoorthy, Sasikumar, L. Venkateswara Reddy, and Sudhakaran Periakaruppan. "Design and Development of an Internet of Things (IoT)-Based Anti-Theft System in Museum Cultural Relics Using RFID." In Advances in Wireless Technologies and Telecommunication, 168–80. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-7685-4.ch013.
Повний текст джерелаFernández-Caramés, Tiago M., Paula Fraga-Lamas, Manuel Suárez-Albela, and Luis Castedo. "A Methodology for Evaluating Security in Commercial RFID Systems." In Radio Frequency Identification. InTech, 2017. http://dx.doi.org/10.5772/64844.
Повний текст джерелаXiao, Yang, Larissa Klimpel, Kaveh Ghaboosi, and Jingyuan Zhang. "Low-Cost Radio Frequency Identification Security." In Security in Distributed and Networking Systems, 151–67. WORLD SCIENTIFIC, 2007. http://dx.doi.org/10.1142/9789812770103_0007.
Повний текст джерелаGódor, Gyozo, and Sándor Imre. "Security Aspects in Radio Frequency Identification Systems." In Next Generation Data Communication Technologies, 187–225. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-477-2.ch009.
Повний текст джерелаPal, Kamalendu. "Radio Frequency Identification Systems Security Challenges in Supply Chain Management." In Smart Devices, Applications, and Protocols for the IoT, 220–42. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7811-6.ch010.
Повний текст джерелаPang, Les. "Radio Frequency IdentificationTechnology in Digital Government." In Information Security and Ethics, 2623–33. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch174.
Повний текст джерелаТези доповідей конференцій з теми "Radio frequency identification systems Security measures"
Alshammri, Turki, Mohammed Albakheet, and Ibraheem Kateeb. "Survey on Radio Frequency Identification Security and Attacks." In ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3508072.3508095.
Повний текст джерелаShen, Guanxiong, Junqing Zhang, Alan Marshall, Mikko Valkama, and Joseph Cavallaro. "Radio Frequency Fingerprint Identification for Security in Low-Cost IoT Devices." In 2021 55th Asilomar Conference on Signals, Systems, and Computers. IEEE, 2021. http://dx.doi.org/10.1109/ieeeconf53345.2021.9723287.
Повний текст джерелаHlady, Joseph, and Somen Mondal. "Integration of Radio Frequency Identification and GIS for Asset Management." In 2008 7th International Pipeline Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/ipc2008-64062.
Повний текст джерелаMcCoy, Michael, Christopher Isert, Douglas Jackson, and John Naber. "A Frequency Counter Based Analog-to-Digital Converter for a Low-Power RFID Biomedical Telemetry System." In ASME 2007 2nd Frontiers in Biomedical Devices Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/biomed2007-38114.
Повний текст джерелаCouto, Christiana, Gabriela Moutinho de Souza Dias, Ronaldo Moreira Salles, and Gustavo Claudio Karl Couto. "A Scalable and Secure Protocol for RFID Based on “Advanced Encryption Standard” and Elliptic Curve Cryptography." In Simpósio Brasileiro de Computação Ubíqua e Pervasiva. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbcup.2022.222771.
Повний текст джерелаFleisch, Ruth, Robert Schöch, and Christian Hillbrand. "A Batch Tracing System for Thermochemical Finishing Processes Enables New Services for Quality Management." In ASME 2012 11th Biennial Conference on Engineering Systems Design and Analysis. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/esda2012-82299.
Повний текст джерела