54 research outputs found

    Locating Agents in RFID Architectures

    Get PDF
    The use of software agents can create an “intelligent” interface between users’ preferences and the back‐end systems. Agents are now able to interact and communicate with each other, forming a virtual community and feeding back the user with suggestions. Innovative systems related to Asset Tracking, Inventory and Shelving architectures are more often involving advanced communication techniques (e.g., RFID); these systems are responsible for user authentication and objects verification. RFID systems could have jamming situations where many objects are moving at the same time and in the same direction. Moreover, other disadvantages have also been observed, such as hindering further implementations, privacy and security issues problems, in addition to the system’s disruptive behavior in case of crowd checkouts (e.g., Supermarket and Airports). Addressing these disadvantages, this paper proposes a possible integration between a Multi‐Agent framework and an RFID‐based application (back‐end). This integration would allow objects (such as passports or goods) with RFID tags to better check‐out through airports or supermarket gates that contain RFID‐readers

    In Things We Trust? Towards trustability in the Internet of Things

    Full text link
    This essay discusses the main privacy, security and trustability issues with the Internet of Things

    Enhancing RFID tag resistance against cloning attack

    Full text link
    In its current form, RFID system are susceptible to a range of malevolent attacks. With the rich business intelligence that RFID infrastructure could possibly carry, security is of paramount importance. In this paper, we formalise various threat models due tag cloning on the RFID system. We also present a simple but efficient and cost effect technique that strengthens the resistance of RFID tags to cloning attacks. Our techniques can even strengthen tags against cloning in environments with untrusted reading devices.<br /

    Evidential Recovery in a RFID Business System

    Get PDF
    Efficient stock management in the commercial retail sector is being dominated by Radio Frequency Identification (RFID) tag implementations. Research reports of the security risk of RFID tags show that breaches are likely and that forensic readiness is a requirement. In this paper a RFID tag business simulation is reported that replicates previous research reports of security breaches with the purpose of identifying potential evidence after such attacks. A Read/Write Tag was cloned and used to replicate a SQL poisoning attack on a simulated Business System. A forensic investigation was then undertaken to identify potential locations for evidential recovery. This paper differentiates from the replicated studies in that the whole Business System is considered evidential. The scope of the inquiry includes the technical artefacts, the information artefacts and the human actors. The result of the investigation shows locations of evidence and the priority for investigations in RFID system architectures

    Automaattiset tunnistusteknologiat terveydenhuollossa: vaatimukset ja rajoitukset RFID‐teknologialle

    Get PDF
    RFID on kasvava teknologia eri teollisuuden aloilla. Tekniikkana sit&auml; on k&auml;ytetty jo II‐maailmansodasta l&auml;htien,mutta vasta viime vuosikymmenill&auml; informaatioteknologian toimijat ovat aloittaneet tutkimuksia ja hankkeita tekniikan kehitt&auml;mist&auml; varten. Nyt teknologia on saavuttanut my&ouml;s terveydenhuollon sektorin. T&auml;m&auml;n paperin tarkoituksena on selvitt&auml;&auml;, mit&auml; vaatimuksia ja rajoituksia terveydenhuolto asettaa RFID‐teknologialle sairaalaymp&auml;rist&ouml;ss&auml;. Tutkimustulokset perustuvat kirjallisuuskatsaukseen, tutkimusryhm&auml;mme tutkimuksiin sek&auml; palavereihin ja ty&ouml;pajoihin terveydenhuollon ammattilaisten ja tutkimusryhm&auml;mme v&auml;lill&auml;. Paperi on osa It&auml;‐Suomen yliopiston Tietojenk&auml;sittelytieteen laitoksella k&auml;ynniss&auml; olevaa MaISSI (Managing IT Services and Service Implementation) ‐hanketta
    • 

    corecore