2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI) 2019
DOI: 10.1109/kbei.2019.8735043
|View full text |Cite
|
Sign up to set email alerts
|

Investigating attacks to improve security and privacy in RFID systems using the security bit method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…In transit, data is more vulnerable to cyber‐attacks as compared with data at rest. If an IIoT application is vulnerable to data theft attacks then the registered users of this application may be affected badly 70 . The system can prevent these attacks by deploying encryption techniques, network authentication, data isolation, and so on. Malicious code injection : Attackers normally use the simplest and easiest methods to launch an attack on the system.…”
Section: Security Issues In the Industrial Internet Of Thingsmentioning
confidence: 99%
“…In transit, data is more vulnerable to cyber‐attacks as compared with data at rest. If an IIoT application is vulnerable to data theft attacks then the registered users of this application may be affected badly 70 . The system can prevent these attacks by deploying encryption techniques, network authentication, data isolation, and so on. Malicious code injection : Attackers normally use the simplest and easiest methods to launch an attack on the system.…”
Section: Security Issues In the Industrial Internet Of Thingsmentioning
confidence: 99%
“…According to Damghani et al [16], spoofing is a category of attack where an invader pretends to be someone else or something else. In the context of routing protocols, he further elaborated that spoofing involves sending packets with a fictitious source address to make it appear as if they are coming from a trusted source [16].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In some RFID applications, setting the correct distance between the tag and the reader requires considerable effort from the developers. For example, the authors of [198] state that an RFID application that authorizes access to a garage may require drivers to install an RFID-enable card within inches of the reader or may need a proximity of several feet to the RFID-enabled transponder within the car. This choice needs to consider various factors such as price and convenience.…”
Section: Analysis On Security and Privacy Guidelines For Rfidmentioning
confidence: 99%