Intrusion Detection in RFID Systems

被引:0
|
作者
Thamilarasu, Geethapriya [1 ]
Sridhar, Ramalingam [1 ]
机构
[1] SUNY Buffalo, Buffalo, NY 14260 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, advances in Radio Frequency identification (RFID) technology has led to their widespread adoption in diverse applications such as object identification, access authorization, environmental monitoring and supply chain management. Although the increased proliferation of tags enables new applications, they also raise many unique and potentially serious security and privacy concerns. Security solutions in RFID systems need to be strengthened to ensure information integrity and to prevent hackers from exploiting the sensitive tag data. In this paper, we address the importance of intrusion detection security paradigm for RFID systems. We present an overview of state of the art in RFID security and investigate the limitations of traditional security solutions based on cryptographic primitives and protocols. We propose an RFID intrusion detection model that integrates information from RFID reader layer and middleware layer to detect anomalous behavior in the network, thus improving their resilience to security attacks.
引用
收藏
页码:1248 / 1254
页数:7
相关论文
共 50 条
  • [1] An Ontology-based Intrusion Detection for RFID Systems
    Esposito, M.
    Della Vecchia, G.
    TECHNOLOGICAL DEVELOPMENTS IN NETWORKING, EDUCATION AND AUTOMATION, 2010, : 467 - 472
  • [2] An Effective Intrusion Detection Approach for Jamming Attacks on RFID Systems
    Avanco, Leandro
    Guelfi, A. E.
    Pontes, Elvis
    Silva, A. A. A.
    Kofuji, S. T.
    Zhou, F.
    2015 INTERNATIONAL EURASIP WORKSHOP ON RFID TECHNOLOGY (EURFID), 2015, : 73 - 80
  • [3] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177
  • [4] Intrusion detection systems
    IEEE Intelligent Systems and Their Applications, 2001, 16 (01):
  • [5] INTRUSION DETECTION SYSTEMS
    WILLIAMS, JD
    TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1979, 33 (NOV): : 733 - 734
  • [6] Collaborative RFID intrusion detection with an artificial immune system
    Yang, Haidong
    Guo, Jianhua
    Deng, Feiqi
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2011, 36 (01) : 1 - 26
  • [7] Intrusion Detection Methods Based on Incomplete RFID Traces
    Li Peng
    Wang Zhen
    Xu He
    Zhu Feng
    Wang Ruchuan
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (04) : 675 - 680
  • [8] Collaborative RFID intrusion detection with an artificial immune system
    Haidong Yang
    Jianhua Guo
    Feiqi Deng
    Journal of Intelligent Information Systems, 2011, 36 : 1 - 26
  • [9] Intrusion Detection Methods Based on Incomplete RFID Traces
    LI Peng
    WANG Zhen
    XU He
    ZHU Feng
    WANG Ruchuan
    ChineseJournalofElectronics, 2017, 26 (04) : 675 - 680
  • [10] A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS
    Chakravarthi, S. Sreenivasa
    Veluru, Suresh
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 730 - 737