54 research outputs found
Locating Agents in RFID Architectures
The use of software agents can create an âintelligentâ interface between usersâ preferences and the backâend systems. Agents are now able to interact and communicate with each other, forming a virtual community and feeding back the user with suggestions. Innovative systems related to Asset Tracking, Inventory and Shelving architectures are more often involving advanced communication techniques (e.g., RFID); these systems are responsible for user authentication and objects verification. RFID systems could have jamming situations where many objects are moving at the same time and in the same direction. Moreover, other disadvantages have also been observed, such as hindering further implementations, privacy and security issues problems, in addition to the systemâs disruptive behavior in case of crowd checkouts (e.g., Supermarket and Airports). Addressing these disadvantages, this paper proposes a possible integration between a MultiâAgent framework and an RFIDâbased application (backâend). This integration would allow objects (such as passports or goods) with RFID tags to better checkâout through airports or supermarket gates that contain RFIDâreaders
In Things We Trust? Towards trustability in the Internet of Things
This essay discusses the main privacy, security and trustability issues with
the Internet of Things
Enhancing RFID tag resistance against cloning attack
In its current form, RFID system are susceptible to a range of malevolent attacks. With the rich business intelligence that RFID infrastructure could possibly carry, security is of paramount importance. In this paper, we formalise various threat models due tag cloning on the RFID system. We also present a simple but efficient and cost effect technique that strengthens the resistance of RFID tags to cloning attacks. Our techniques can even strengthen tags against cloning in environments with untrusted reading devices.<br /
Evidential Recovery in a RFID Business System
Efficient stock management in the commercial retail sector is being dominated by Radio Frequency Identification (RFID) tag implementations. Research reports of the security risk of RFID tags show that breaches are likely and that forensic readiness is a requirement. In this paper a RFID tag business simulation is reported that replicates previous research reports of security breaches with the purpose of identifying potential evidence after such attacks. A Read/Write Tag was cloned and used to replicate a SQL poisoning attack on a simulated Business System. A forensic investigation was then undertaken to identify potential locations for evidential recovery. This paper differentiates from the replicated studies in that the whole Business System is considered evidential. The scope of the inquiry includes the technical artefacts, the information artefacts and the human actors. The result of the investigation shows locations of evidence and the priority for investigations in RFID system architectures
Recommended from our members
Human enhancement: could you become infected with a computer virus?
Experiments demonstrating human enhancement through the implantation of technology in healthy humans have been performed for over a decade by some academic research groups. More recently, technology enthusiasts have begun to realize the potential of implantable technology such as glass capsule RFID transponders. In this paper it is argued that implantable RFID devices have evolved to the point whereby we should consider the devices themselves as simple computers. Presented here is the infection with a computer virus of an RFID device implanted in a human. Coupled with our developing concept of what constitutes the human body and its boundaries, it is argued that this study has given rise to the worldâs first human infected with a computer virus. It has taken the wider academic community some time to agree that meaningful discourse on the topic of implantable technology is of value. As developments in medical technologies point to greater possibilities for enhancement, this shift in thinking is not too soon in coming
Automaattiset tunnistusteknologiat terveydenhuollossa: vaatimukset ja rajoitukset RFIDâteknologialle
RFID on kasvava teknologia eri teollisuuden aloilla. Tekniikkana sitä on käytetty jo IIâmaailmansodasta lähtien,mutta vasta viime vuosikymmenillä informaatioteknologian toimijat ovat aloittaneet tutkimuksia ja hankkeita tekniikan kehittämistä varten. Nyt teknologia on saavuttanut myös terveydenhuollon sektorin. Tämän paperin tarkoituksena on selvittää, mitä vaatimuksia ja rajoituksia terveydenhuolto asettaa RFIDâteknologialle sairaalaympäristössä. Tutkimustulokset perustuvat kirjallisuuskatsaukseen, tutkimusryhmämme tutkimuksiin sekä palavereihin ja työpajoihin terveydenhuollon ammattilaisten ja tutkimusryhmämme välillä. Paperi on osa ItäâSuomen yliopiston Tietojenkäsittelytieteen laitoksella käynnissä olevaa MaISSI (Managing IT Services and Service Implementation) âhanketta
- âŠ