2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE) 2020
DOI: 10.1109/icstcee49637.2020.9277007
|View full text |Cite
|
Sign up to set email alerts
|

Edge Data Security for RFID-based Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
0
0
Order By: Relevance
“…(Abbas,et al,2020).IoT devicesareusedfortheagriculturalenvironmentforagriculturalsecuritysurveillance,cropirrigation efficiency,andfooddatastorage. (Saigopal,et al,2020).Indistributionnetworksectors,thefreight anddistributionsectoriscritical(Chaurasia2020; Maharani,et al,2020;Ambareen,et al,2020;Juárez 2019) (Zolanvari,et al,2021;Priya,et al,2021).Asaresult,tocombatassaultsandsecureindustrialsystems,acomprehensiveintrusion detectiontechniqueisnecessary. Themajorcontributionofthisresearchworkis:…”
Section: Industrial Iot (Iiot) Network: Ids Requirementmentioning
confidence: 99%
“…(Abbas,et al,2020).IoT devicesareusedfortheagriculturalenvironmentforagriculturalsecuritysurveillance,cropirrigation efficiency,andfooddatastorage. (Saigopal,et al,2020).Indistributionnetworksectors,thefreight anddistributionsectoriscritical(Chaurasia2020; Maharani,et al,2020;Ambareen,et al,2020;Juárez 2019) (Zolanvari,et al,2021;Priya,et al,2021).Asaresult,tocombatassaultsandsecureindustrialsystems,acomprehensiveintrusion detectiontechniqueisnecessary. Themajorcontributionofthisresearchworkis:…”
Section: Industrial Iot (Iiot) Network: Ids Requirementmentioning
confidence: 99%
“…An encryption protocol that combines the advanced encryption standard (AES) and elliptic curve cryptography (ECC) algorithms to enhance RFID data security is proposed in paper [9], this approach aims to achieve optimal effectiveness and efficiency in safeguarding the information. In [10], data security is ensured by using peak modulation and backscattering to simultaneously modulate sensor and identification (ID) information. In [11], the authors have developed an algorithm that effectively secures the information stored in RFID tags through the use of triple DES and RSA encryption.…”
Section: Introductionmentioning
confidence: 99%