7,954 research outputs found
Securing the Internet of Things Infrastructure - Standards and Techniques
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed
Using colocation to support human memory
The progress of health care in the western world has been
marked by an increase in life expectancy. Advances in life
expectancy have meant that more people are living with
acute health problems, many of which are related to impairment
of memory. This paper describes a pair of scenarios
that use RFID to assist people who may suffer frommemory
defects to extend their capability for independent living. We
present our implementation of an RFID glove, describe its
operation, and show how it enables the application scenarios
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising
technologies in the field of ubiquitous computing. Indeed, RFID technology may
well replace barcode technology. Although it offers many advantages over other
identification systems, there are also associated security risks that are not
easy to be addressed. When designing a real lightweight authentication protocol
for low cost RFID tags, a number of challenges arise due to the extremely
limited computational, storage and communication abilities of Low-cost RFID
tags. This paper proposes a real mutual authentication protocol for low cost
RFID tags. The proposed protocol prevents passive attacks as active attacks are
discounted when designing a protocol to meet the requirements of low cost RFID
tags. However the implementation of the protocol meets the limited abilities of
low cost RFID tags.Comment: 11 Pages, IJNS
Thin Flexible Radio Frequency Identification Tags And Subsystems Thereof
Embodiments according to the present invention comprised RFID tags comprised of components disposed on a flexible conformal substrate. The substrate may be substantially transparent or opaque and the components may be comprised of organic electronic components. Components and circuits may be manufactured using thin-film deposition processes or by deposition of metal-containing inks using inkjet technology. Exemplary use of an embodiment according to the present invention is as a component in an on-vehicle radio-frequency (RF) automated toll system.Georgia Tech Research Corporatio
Wireless communication, identification and sensing technologies enabling integrated logistics: a study in the harbor environment
In the last decade, integrated logistics has become an important challenge in
the development of wireless communication, identification and sensing
technology, due to the growing complexity of logistics processes and the
increasing demand for adapting systems to new requirements. The advancement of
wireless technology provides a wide range of options for the maritime container
terminals. Electronic devices employed in container terminals reduce the manual
effort, facilitating timely information flow and enhancing control and quality
of service and decision made. In this paper, we examine the technology that can
be used to support integration in harbor's logistics. In the literature, most
systems have been developed to address specific needs of particular harbors,
but a systematic study is missing. The purpose is to provide an overview to the
reader about which technology of integrated logistics can be implemented and
what remains to be addressed in the future
- …