Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Jacqueline Hartnett"'
Publikováno v:
IEEE Pervasive Computing. 8:79-84
A taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems. RFID systems are classified by their informational goals-typically, authorization and monitoring. Authorization systems replace the
Publikováno v:
2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
Attacks in RFID systems are known to be expressed in output data. As these systems become more widespread, research into detecting attacks in the output data which is produced when RFID components interact will become more important. However, the pro
Publikováno v:
ISPAN
Attacks at the “RFID layer”, where tags and readers interact, appear in the output data used by the “strategic layer” to monitor or authorize entities. Previous research has used contextual information from the “real world layer” or “st