Intrusion Detection in RFID Systems

被引:0
|
作者
Thamilarasu, Geethapriya [1 ]
Sridhar, Ramalingam [1 ]
机构
[1] SUNY Buffalo, Buffalo, NY 14260 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, advances in Radio Frequency identification (RFID) technology has led to their widespread adoption in diverse applications such as object identification, access authorization, environmental monitoring and supply chain management. Although the increased proliferation of tags enables new applications, they also raise many unique and potentially serious security and privacy concerns. Security solutions in RFID systems need to be strengthened to ensure information integrity and to prevent hackers from exploiting the sensitive tag data. In this paper, we address the importance of intrusion detection security paradigm for RFID systems. We present an overview of state of the art in RFID security and investigate the limitations of traditional security solutions based on cryptographic primitives and protocols. We propose an RFID intrusion detection model that integrates information from RFID reader layer and middleware layer to detect anomalous behavior in the network, thus improving their resilience to security attacks.
引用
收藏
页码:1248 / 1254
页数:7
相关论文
共 50 条
  • [31] A Survey on Intrusion Detection and Prevention Systems
    Gupta N.
    Jindal V.
    Bedi P.
    SN Computer Science, 4 (5)
  • [32] A methodology for testing intrusion detection systems
    Puketza, NJ
    Zhang, K
    Chung, M
    Mukherjee, B
    Olsson, RA
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (10) : 719 - 729
  • [33] Data Mining and Intrusion Detection Systems
    Dewa, Zibusiso
    Maglaras, Leandros A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 62 - 71
  • [34] Active Learning for Intrusion Detection Systems
    Quang-Vinh Dang
    2020 RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (RIVF 2020), 2020, : 382 - 384
  • [35] Deep Learning in Intrusion Detection Systems
    Karatas, Gozde
    Demir, Onder
    Sahingoz, Ozgur Koray
    2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), 2018, : 113 - 116
  • [36] Vulnerabilities categories for intrusion detection systems
    Venter, HS
    Eloff, JHP
    COMPUTERS & SECURITY, 2002, 21 (07) : 617 - 619
  • [37] Virtualization in Network Intrusion Detection Systems
    Akhlaq, Monis
    Alserhani, Faeiz
    Awan, Irfan U.
    Cullen, Andrea J.
    Mellor, John
    Mirchandani, Pravin
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009 WORKSHOPS, 2009, 5872 : 6 - +
  • [38] Performance Enhancement for Intrusion Detection Systems
    Baz, Abdullah
    Abuayeid, Samah
    Alhakami, Hosam
    Alsubait, Tahani
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (04): : 229 - 239
  • [39] Securing Collaborative Intrusion Detection Systems
    Cheung, Steven
    IEEE SECURITY & PRIVACY, 2011, 9 (06) : 36 - 42
  • [40] Performance of the Network Intrusion Detection Systems
    Murthy, M. V. Ramana
    Kumar, P. Ram
    Rao, E. Devender
    Sharma, A. C.
    Rajender, S.
    Rambabu, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (10): : 198 - 202