Technological Developments in Networking, Education and Automation 2010
DOI: 10.1007/978-90-481-9151-2_81
|View full text |Cite
|
Sign up to set email alerts
|

An Ontology-based Intrusion Detection for RFID Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…The RFID tags are available in tiny sizes that contain several resources; however, they suffer from the security threats such as tag cloning. Esposito et al discuss an intrusion detection model to identify the tag cloning threats by using the ontology‐based misuse detection approach. The RFID tags have authorized entity ownership.…”
Section: Introductionmentioning
confidence: 99%
“…The RFID tags are available in tiny sizes that contain several resources; however, they suffer from the security threats such as tag cloning. Esposito et al discuss an intrusion detection model to identify the tag cloning threats by using the ontology‐based misuse detection approach. The RFID tags have authorized entity ownership.…”
Section: Introductionmentioning
confidence: 99%
“…Specific hazards include access control in supply chain, ticket copy, tags pay, and tag anti-counterfeiting. The traditional approach improves tag authentication encryption algorithm to increase the difficulty of cloning [1] ; another unconventional method uses the visibility of the RFID traces provided by RFID system to test and locate the cloned tag [2] .…”
Section: Introductionmentioning
confidence: 99%