[go: up one dir, main page]

Avanco et al., 2015 - Google Patents

An effective intrusion detection approach for jamming attacks on RFID systems

Avanco et al., 2015

View PDF
Document ID
15594953700235299823
Author
Avanco L
Guelfi A
Pontes E
Silva A
Kofuji S
Zhou F
Publication year
Publication venue
2015 International EURASIP Workshop on RFID Technology (EURFID)

External Links

Snippet

Private companies and government have decided to provide Radio Frequency Identification (RFID) systems in places of free access to the population. However, as a result of such exposition, these systems become vulnerable to Denial of Service (DoS) attacks that can …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting

Similar Documents

Publication Publication Date Title
Avanco et al. An effective intrusion detection approach for jamming attacks on RFID systems
EP3276527B1 (en) Electromagnetic threat detection and mitigation in the internet of things
EP3213105B1 (en) Advanced localization of radio transmitters in electromagnetic environments
EP3433749B1 (en) Identifying and trapping wireless based attacks on networks using deceptive network emulation
US11856012B2 (en) Passive physical layer distinct native attribute cyber security monitor
Park et al. Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness
Alizadeh et al. A survey on attacks in RFID networks
Kumari et al. SmRM: Ensemble Learning Devised Solution for Smart Riskware Management in Android Machines
Thankappan et al. A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks
Selvi et al. SVM based two level authentication for primary user emulation attack detection
Ahmad et al. Performance analysis of intrusion detection systems for smartphone security enhancements
KR20170019302A (en) Apparatus and method for detecting intrusion of smart-grid
US11489848B2 (en) Personal information skimmer detection device
Fu et al. A research on Denial of Service attack in passive RFID system
Yan et al. Hardware-fingerprint based authentication for NFC devices in power grids
Lemieszewski et al. Optimization of RFID Attack Detection using a Received Signal Strength Indication Comparison Method
Nguyen et al. Performance evaluation of missing-tag algorithms in CDMA-based RFID systems
Shu et al. The Internet of Things and IT Auditing
Swinney et al. Radio Frequency (RF) Cyber Threats and
Wakhloo et al. Investigation of WiFi Security Auditing Tools for Evil Twin Attacks and Detection
Nhem et al. Ethical Applications of the Invisible Identity in Wireless Device with Radio Frequency Fingerprint
Swinney et al. Radio Frequency (RF) Cyber Threats and a Novel RF Cyber Kill Chain
Agrawal et al. Centralized mechanism for device encapsulation prevention in Internet of Things
Joshua et al. Detecting False Data Attacks Using KPG-MT Technique
CN119939680A (en) A method and system for detecting slow leakage of sensitive data based on adaptive perception