2017 18th International Carpathian Control Conference (ICCC) 2017
DOI: 10.1109/carpathiancc.2017.7970418
|View full text |Cite
|
Sign up to set email alerts
|

The security of RFID readers with IDS/IPS solution using Raspberry Pi

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…Another detection system, Suricata [8], is a popular public IDS, fully supports multithreading architecture, and is more suitable for large-scale network systems. The study [9] used the Suricata to implement the detection system on the resource constraint device, Raspberry Pi. They aim to detect the port scanning attack on the IoT environment.…”
Section: Related Workmentioning
confidence: 99%
“…Another detection system, Suricata [8], is a popular public IDS, fully supports multithreading architecture, and is more suitable for large-scale network systems. The study [9] used the Suricata to implement the detection system on the resource constraint device, Raspberry Pi. They aim to detect the port scanning attack on the IoT environment.…”
Section: Related Workmentioning
confidence: 99%
“…Misuse-based detection systems are implemented using predefined attack signatures. Thus, they cannot detect new kinds of attacks and new variants of known attacks [5]. Although anomaly detection systems may be effective for new kinds of attacks, the problem of the high false positive rate is one of the main challenges [6,7].…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%
“…The IDS studies [5,[19][20][21][22][23][24][25][26][27] also have proposed attack detection based on Raspberry Pi. In the work of [18], the anomaly-based detection method was proposed by capturing the previous traffic patterns asbenign data for attack detection system construction.…”
Section: Raspberry Pi-based Idsmentioning
confidence: 99%
See 1 more Smart Citation
“…In an effort to secure Electronic Health Records (EHR), Zitta et al [46] employed smart contracts on an Ethereum blockchain to develop intelligent EHR that are stored in individual nodes. Garman et al [47] proposed an anonymous credential authentication scheme that does not require a trusted credential issuer rather uses a public append-only ledger (blockchain).…”
Section: A Blockchain-based Security and Privacy Preservation Schemementioning
confidence: 99%