Avanco et al., 2015 - Google Patents
An effective intrusion detection approach for jamming attacks on RFID systemsAvanco et al., 2015
View PDF- Document ID
- 15594953700235299823
- Author
- Avanco L
- Guelfi A
- Pontes E
- Silva A
- Kofuji S
- Zhou F
- Publication year
- Publication venue
- 2015 International EURASIP Workshop on RFID Technology (EURFID)
External Links
Snippet
Private companies and government have decided to provide Radio Frequency Identification (RFID) systems in places of free access to the population. However, as a result of such exposition, these systems become vulnerable to Denial of Service (DoS) attacks that can …
- 238000001514 detection method 0 title abstract description 71
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Avanco et al. | An effective intrusion detection approach for jamming attacks on RFID systems | |
| EP3276527B1 (en) | Electromagnetic threat detection and mitigation in the internet of things | |
| EP3213105B1 (en) | Advanced localization of radio transmitters in electromagnetic environments | |
| EP3433749B1 (en) | Identifying and trapping wireless based attacks on networks using deceptive network emulation | |
| US11856012B2 (en) | Passive physical layer distinct native attribute cyber security monitor | |
| Park et al. | Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness | |
| Alizadeh et al. | A survey on attacks in RFID networks | |
| Kumari et al. | SmRM: Ensemble Learning Devised Solution for Smart Riskware Management in Android Machines | |
| Thankappan et al. | A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks | |
| Selvi et al. | SVM based two level authentication for primary user emulation attack detection | |
| Ahmad et al. | Performance analysis of intrusion detection systems for smartphone security enhancements | |
| KR20170019302A (en) | Apparatus and method for detecting intrusion of smart-grid | |
| US11489848B2 (en) | Personal information skimmer detection device | |
| Fu et al. | A research on Denial of Service attack in passive RFID system | |
| Yan et al. | Hardware-fingerprint based authentication for NFC devices in power grids | |
| Lemieszewski et al. | Optimization of RFID Attack Detection using a Received Signal Strength Indication Comparison Method | |
| Nguyen et al. | Performance evaluation of missing-tag algorithms in CDMA-based RFID systems | |
| Shu et al. | The Internet of Things and IT Auditing | |
| Swinney et al. | Radio Frequency (RF) Cyber Threats and | |
| Wakhloo et al. | Investigation of WiFi Security Auditing Tools for Evil Twin Attacks and Detection | |
| Nhem et al. | Ethical Applications of the Invisible Identity in Wireless Device with Radio Frequency Fingerprint | |
| Swinney et al. | Radio Frequency (RF) Cyber Threats and a Novel RF Cyber Kill Chain | |
| Agrawal et al. | Centralized mechanism for device encapsulation prevention in Internet of Things | |
| Joshua et al. | Detecting False Data Attacks Using KPG-MT Technique | |
| CN119939680A (en) | A method and system for detecting slow leakage of sensitive data based on adaptive perception |