Results 1 - 10
of
630
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
, 2003
"... Like many technologies, low-cost Radio Frequency Identification (RFID) systems will become pervasive in our daily lives when affixed to everyday consumer items as "smart labels". While yielding great productivity gains, RFID systems may create new threats to the security and privacy of ..."
Abstract
-
Cited by 311 (5 self)
- Add to MetaCart
of individuals or organizations. This paper presents a brief description of RFID systems and their operation. We describe privacy and security risks and how they apply to the unique setting of low-cost RFID devices. We propose several security mechanisms and suggest areas for future research.
Multiple Object Identification with Passive RFID Tags
, 2002
"... We investigate the applicability of passive RFID systems to the task of identifying multiple tagged objects simultaneously, assuming that the number of tags is not known in advance. We present a combinatorial model of the communication mechanism between the reader device and the tags, and use this m ..."
Abstract
-
Cited by 177 (0 self)
- Add to MetaCart
We investigate the applicability of passive RFID systems to the task of identifying multiple tagged objects simultaneously, assuming that the number of tags is not known in advance. We present a combinatorial model of the communication mechanism between the reader device and the tags, and use
A Framework for Constructing Features and Models for Intrusion Detection Systems
- ACM Transactions on Information and System Security
, 2000
"... Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs) need to be accurate, adaptive, and extensible. Given these requirements and the complexities of today’s network environments, we need a more systematic and automated IDS dev ..."
Abstract
-
Cited by 223 (7 self)
- Add to MetaCart
Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs) need to be accurate, adaptive, and extensible. Given these requirements and the complexities of today’s network environments, we need a more systematic and automated IDS
Dynamic and Aggressive Scheduling Techniques for Power-Aware Real-Time Systems
, 2001
"... In this paper, we address power-aware scheduling of periodic hard real-time tasks using dynamic voltage scaling. Our solution includes three parts: (a) a static (off-line) solution to compute the optimal speed, assuming worst-case workload for each arrival, (b) an on-line speed reduction mechanism t ..."
Abstract
-
Cited by 204 (24 self)
- Add to MetaCart
In this paper, we address power-aware scheduling of periodic hard real-time tasks using dynamic voltage scaling. Our solution includes three parts: (a) a static (off-line) solution to compute the optimal speed, assuming worst-case workload for each arrival, (b) an on-line speed reduction mechanism
Modeling privacy for off-line RFID systems
- In 9th Smart Card Research and Advanced Applications (CARDIS 2010), volume 6035 of Lecture Notes in Computer Science
, 2010
"... Abstract. Thispaperestablishes anovelmodelforRFIDschemeswhere readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only capable of compromising tags, but also of compromising readers. This more properly models large scale deployment of RF ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
of RFID technology such as in public transport ticketing systems and supply-chain management systems. In this model we define notions of security (only legitimate tags can authenticate) and of privacy (no adversary is capable of tracking legitimate tags). We show that privacy is always lost at the moment
RFID-tags for Anti-Counterfeiting
- Topics in Cryptology - CT-RSA 2006, volume 3860 of LNCS
, 2006
"... Abstract. RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. This chip functionality makes it possible to verify the authenticity of a product and hence to detect and prev ..."
Abstract
-
Cited by 51 (5 self)
- Add to MetaCart
(PUF). We present the security protocols that are needed for the detection of the authenticity of a product when it is equipped with such a system. We focus on off-line authentication because it is very attractive from a practical point of view. We show that a PUF based solution for RFID
Fast and reliable estimation schemes in RFID systems
- In MobiCom
, 2006
"... RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with the cost of these tags correspondingly ranging from a few pennies to many dollars. One of the common problems that arise i ..."
Abstract
-
Cited by 62 (0 self)
- Add to MetaCart
different, more practical approach, and provide very fast and reliable estimation mechanisms. In particular, we analyze our estimation schemes and show that the time needed to estimate the number of tags in the system for a given accuracy is much better than schemes presented in related work. We show
1 Security in RFID Systems
"... (RFID) systems are one of the hot topics in the computer industry and it is receiving lots of attention from public and private sector. While RFID is suffering from poor security mechanisms, adding RFID tags to ordinary goods jeopardizes public privacy and has caused consumer protests. It is not sur ..."
Abstract
- Add to MetaCart
(RFID) systems are one of the hot topics in the computer industry and it is receiving lots of attention from public and private sector. While RFID is suffering from poor security mechanisms, adding RFID tags to ordinary goods jeopardizes public privacy and has caused consumer protests
Ferret: RFID Localization for Pervasive Multimedia
- Proceedings of the 8th International Conference on Ubiquitous Computing
, 2006
"... Abstract. The pervasive nature of multimedia recording devices enables novel pervasive multimedia applications with automatic, inexpensive, and ubiquitous identification and locationing abilities. We present the design and implementation of Ferret, a scalable system for locating nomadic objects augm ..."
Abstract
-
Cited by 32 (1 self)
- Add to MetaCart
augmented with RFID tags and displaying them to a user in real-time. We present two alternative algorithms for refining a postulation of an object’s location using a stream of noisy readings from an RFID reader: an online algorithm for real-time use on a mobile device, and an offline algorithm for use
Active RFID System with Cryptography and Authentication Mechanisms *
"... Radio frequency identification (RFID) systems have recently been used in a large number of applications. Security and privacy issues have also imposed significant challenges on these systems. Cryptography and authentication protocols have been utilized to effectively solve the security and privacy p ..."
Abstract
- Add to MetaCart
Radio frequency identification (RFID) systems have recently been used in a large number of applications. Security and privacy issues have also imposed significant challenges on these systems. Cryptography and authentication protocols have been utilized to effectively solve the security and privacy
Results 1 - 10
of
630