Academic literature on the topic 'Computer networks Computer security. Data protection. Information technology Radio frequency identification systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Computer security. Data protection. Information technology Radio frequency identification systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks Computer security. Data protection. Information technology Radio frequency identification systems"

1

Dong, Qingkuan, Mengmeng Chen, Lulu Li, and Kai Fan. "Cloud-based radio frequency identification authentication protocol with location privacy protection." International Journal of Distributed Sensor Networks 14, no. 1 (January 2018): 155014771875496. http://dx.doi.org/10.1177/1550147718754969.

Full text
Abstract:
With the development of the Internet of things and cloud storage, a large number of objects access to the Internet through radio frequency identification technology, cloud-based radio frequency identification system attracts more attention because it can reduce the costs of system maintenance by renting the cloud storage service on demand. Especially, it is very suitable for the small- and medium-sized enterprises. However, the security and privacy issues of the cloud-based radio frequency identification system are more serious than traditional radio frequency identification systems. The link between the reader and the cloud is no longer secure, and the cloud service provider is not trusted. Both the location privacy of the reader and the data privacy of the radio frequency identification system are not able to be exposed to the cloud service provider. In this article, a cloud-based radio frequency identification authentication protocol is proposed. It considers not only the mutual authentication between the reader and the tag, but also the security of data transmission between the reader and the cloud database. In particular, in order to solve the reader’s location privacy problem, the proposed scheme introduces MIPv6 network framework without adding additional infrastructure. The experimental verification with AVISPA tool shows that the protocol satisfies the mutual authentication property. Compared with other cloud-based schemes, the proposed protocol has obvious advantages in deployment cost, scalability, real-time authentication, and the tag’s computational complexity.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Shiyong, and Gongliang Chen. "Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems." International Journal of Distributed Sensor Networks 13, no. 2 (February 2017): 155014771769417. http://dx.doi.org/10.1177/1550147717694171.

Full text
Abstract:
Distributed sensor networks have been widely applied to healthcare, environmental monitoring and management, intelligent transportation, and other fields in which network sensors collect and transmit information about their surrounding environment. Radio frequency identification technology transmits an object’s identification as a unique serial number—using radio waves as the transmission carrier—and is becoming an important building block for distributed sensor networks. However, the security of radio frequency identification systems is a major industrial concern that can significantly hinder the market growth of distributed sensor networks. Trivium is a well-known lightweight synchronous stream cipher that was submitted to the European eSTREAM project in April 2005. In this article, we generalize Trivium to the Trivium-Model algorithm and highlight that security is mainly determined by the internal state bits and the number of nonlinear terms. We propose principles for choosing parameters and generating better parameters that are feasible for low-cost radio frequency identification tags in distributed sensor networks. The new algorithm, named Micro-Trivium, requires less power and a smaller chip area than the original Trivium, which is proven using experimental data and results. Mathematical analysis shows that using Micro-Trivium is as secure as using Trivium.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Zhen, Yibing Li, Chao Wang, Meiyu Wang, Ya Tu, and Jin Wang. "An Ensemble Learning Method for Wireless Multimedia Device Identification." Security and Communication Networks 2018 (October 15, 2018): 1–9. http://dx.doi.org/10.1155/2018/5264526.

Full text
Abstract:
In the last decade, wireless multimedia device is widely used in many fields, which leads to efficiency improvement, reliability, security, and economic benefits in our daily life. However, with the rapid development of new technologies, the wireless multimedia data transmission security is confronted with a series of new threats and challenges. In physical layer, Radio Frequency Fingerprinting (RFF) is a unique characteristic of IoT devices themselves, which can difficultly be tampered. The wireless multimedia device identification via Radio Frequency Fingerprinting (RFF) extracted from radio signals is a physical-layer method for data transmission security. Just as people’s unique fingerprinting, different Internet of Things (IoT) devices exhibit different RFF which can be used for identification and authentication. In this paper, a wireless multimedia device identification system based on Ensemble Learning is proposed. The key technologies such as signal detection, RFF extraction, and classification model are discussed. According to the theoretical modeling and experiment validation, the reliability and the differentiability of the RFFs are evaluated and the classification results are shown under the real wireless multimedia device environments.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Zhen-Yu. "An radio-frequency identification security authentication mechanism for Internet of things applications." International Journal of Distributed Sensor Networks 15, no. 7 (July 2019): 155014771986222. http://dx.doi.org/10.1177/1550147719862223.

Full text
Abstract:
Among various Internet of things technologies, radio-frequency identification technology is currently one of the most critical. Radio-frequency identification tags store messages collected by the reader; thereafter, the messages are transmitted to the backend system for processing and analysis, thereby forming a huge knowledge network and achieving the objective of intelligent management of objects. However, the personal information and privacy exposure, malicious tracking, and counterfeiting behaviors remain the unresolved issues in the security area. In this study, we developed a matrix-based authentication protocol that was protected by Hill Cipher Hard Problem by which it can provide confidentiality, anti-counterfeiting, and users’ location privacy. In addition, the identity verification of this scheme based on matrix needs only once matrix multiplication operation to know the outcome. Consequently, the analysis of computational complexity demonstrated that our scheme can handle the mass data from the reader, thereby achieving system extensibility.
APA, Harvard, Vancouver, ISO, and other styles
5

Gódor, Gyozo, and Sándor Imre. "Simple Lightweight Authentication Protocol." International Journal of Business Data Communications and Networking 6, no. 3 (July 2010): 66–94. http://dx.doi.org/10.4018/jbdcn.2010070104.

Full text
Abstract:
Radio frequency identification technology is becoming ubiquitous and, as a side effect, more authentication solutions come to light, which include numerous security issues. The authors’ have previously introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks, which performs exceptionally well in very large systems. In this paper, the authors give a detailed examination of small computational capacity systems from the point of view of security. This paper defines the model of attacker and the well-known attacks that can be achieved in these kinds of environments, as well as an illustration of the proposed protocol’s performance characteristics with measurements carried out in a simulation environment. This paper shows the effects of numerous attacks and the system’s different parameters on the authentication time while examining the performance and security characteristics of two other protocols chosen from the literature to compare the SLAP algorithm and give a proper explanation for the differences between them.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Yu, Xiaolei Liu, and Yanmin Zhao. "Security Cryptanalysis of NUX for the Internet of Things." Security and Communication Networks 2019 (June 12, 2019): 1–12. http://dx.doi.org/10.1155/2019/2062697.

Full text
Abstract:
In order to adopt the restricted environment, such as radio frequency identification technology or sensor networking, which are the important components of the Internet of Things, lightweight block ciphers are designed. NUX is a 31-round iterative ultralightweight cipher proposed by Bansod et al. In this paper, we examine the resistance of NUX to differential and linear analysis and search for 1~31-round differential characteristics and linear approximations. In design specification, authors claimed that 25-round NUX is resistant to differential and linear attack. However, we can successfully perform 29-round differential attack on NUX with the 22-round differential characteristic found in this paper, which is 4 rounds more than the limitation given by authors. Furthermore, we present the key recovery attack on 22-round NUX using a 19-round linear approximation determined in this paper. Besides, distinguishing attack, whose distinguisher is built utilizing the property of differential propagation through NUX, is implemented on full NUX with data complexity 8.
APA, Harvard, Vancouver, ISO, and other styles
7

Hajny, Jan, Petr Dzurenda, and Lukas Malina. "Multidevice Authentication with Strong Privacy Protection." Wireless Communications and Mobile Computing 2018 (July 29, 2018): 1–12. http://dx.doi.org/10.1155/2018/3295148.

Full text
Abstract:
Card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation, or at hotels. Yet these systems have often very poor cryptographic protection. User identifiers and keys can be easily eavesdropped on and counterfeited. The privacy-preserving features are almost missing in these systems. To improve this state, we propose a novel cryptographic scheme based on efficient zero-knowledge proofs and Boneh-Boyen signatures. The proposed scheme is provably secure and provides the full set of privacy-enhancing features, that is, the anonymity, untraceability, and unlinkability of users. Furthermore, our scheme supports distributed multidevice authentication with multiple RFID (Radio-Frequency IDentification) user devices. This feature is particularly important in applications for controlling access to dangerous sites where the presence of protective equipment is checked during each access control session. Besides the full cryptographic specification, we also show the results of our implementation on devices commonly used in access control applications, particularly the smart cards and embedded verification terminals. By avoiding costly operations on user devices, such as bilinear pairings, we were able to achieve times comparable to existing systems (around 500 ms), while providing significantly higher security, privacy protection, and features for RFID multidevice authentication.
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, He, Xin Chen, Feng Zhu, and Peng Li. "A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems." Wireless Communications and Mobile Computing 2021 (July 23, 2021): 1–14. http://dx.doi.org/10.1155/2021/8844178.

Full text
Abstract:
The Radio Frequency Identification (RFID) technology has been integrated into healthcare systems for the purpose of improving healthcare management. However, people have concerns about the security and privacy of this kind of RFID systems. In order to solve the security problems faced by RFID-based healthcare systems, a novel security authentication protocol based on Physical Unclonable Function (PUF) and Advanced Encryption Standard (AES) encryption algorithm is designed. The protocol uses PUF technology to output unique and random responses to different excitation inputs, encrypts the authentication information sent by the tag, and uses the AES encryption algorithm to encrypt the authentication information between the cloud database and the reader. At the same time, in the authentication process, once the communicating entity completes the identity authentication of the other two entities, it immediately starts to update the key. The security analysis and formal analysis of BAN (proposed by Burrows et al.) logic prove the security and correctness of the protocol. Analysis results show that the computation cost and security performance of the proposed protocol are better than the compared protocols. Our findings will contribute to further enhancing the security for RFID healthcare systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Shabbir, Aysha, Maryam Shabbir, Muhammad Rizwan, and Fahad Ahmad. "Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard." Security and Communication Networks 2019 (December 18, 2019): 1–16. http://dx.doi.org/10.1155/2019/2509898.

Full text
Abstract:
Lifeblood of every organization is its confidential information. The accentuation on cybersecurity has expanded considerably in the course of the last few years because of the expanded number in attacks at the individual and organization and even at the state level. One specific zone of consideration is the assurance of the security of nuclear information. This may relate to both Instrumentation and Control (I&C) and Information Technology (IT). The present security measures are insufficient for nuclear information because of their lack of identification, classification, and securing measures (because of their multifaceted nature). With the increasing trends of data storage and management with the assistance of cloud, data confidentiality threats are immensely increasing. As there is no such safeguard that can make our systems a hundred percent secure, the best approach is to provide security at distinct layers. The basic purpose of layered security is to have the benefit that if one layer fails or compromised, the other layer compensates or maintains that confidentiality with the access control in the owner’s hand. In this paper, we have proposed a multilevel approach with protection-based computing by using Modular Encryption Standard (MES). We proposed a cloud framework as well to further enhance its security by utilizing a multicloud and modular approach. By performing simulations, the obtained results depicted that our proposed scheme works efficiently than other commonly used schemes.
APA, Harvard, Vancouver, ISO, and other styles
10

Diamantopoulou, Vasiliki, Aggeliki Tsohou, and Maria Karyda. "From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls." Information & Computer Security 28, no. 4 (June 8, 2020): 645–62. http://dx.doi.org/10.1108/ics-01-2020-0004.

Full text
Abstract:
Purpose This paper aims to identify the controls provisioned in ISO/IEC 27001:2013 and ISO/IEC 27002:2013 that need to be extended to adequately meet, data protection requirements set by the General Data Protection Regulation (GDPR); it also indicates security management actions an organisation needs to perform to fulfil GDPR requirements. Thus, ISO/IEC 27001:2013 compliant organisations, can use this paper as a basis for extending the already existing security control modules towards data protection; and as guidance for reaching compliance with the regulation. Design/methodology/approach This study has followed a two-step approach; first, synergies between ISO/IEC 27001:2013 modules and GDPR requirements were identified, by analysing all 14 control modules of the ISO/IEC 27001:2013 and proposing the appropriate actions towards the satisfaction of data protection requirements. Second, this paper identified GDPR requirements not addressed by ISO/IEC 27001:2013. Findings The findings of this work include the identification of the common ground between the security controls that ISO/IEC 27001:2013 includes and the requirements that the GDPR imposes; the actions that need to be performed based on these security controls to adequately meet the data protection requirements that the GDPR imposes; and the identification of the remaining actions an ISO/IEC 27001 compliant organisation needs to perform to be able to adhere with the GDPR. Originality/value This paper provides a gap analysis and a further steps identification regarding the additional actions that need to be performed to allow an ISO/IEC 27001:2013 certified organisation to be compliant with the GDPR.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer networks Computer security. Data protection. Information technology Radio frequency identification systems"

1

Chapman, Adam Scott Burmester Mike. "A dynamic, perimeter based, community-centric access control system." Diss., 2006. http://etd.lib.fsu.edu/theses/available/04072006-213501.

Full text
Abstract:
Thesis (M.S.)--Florida State University, 2006.
Advisor: Mike Burmester, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 15, 2006). Document formatted into pages; contains viii, 48 pages. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer networks Computer security. Data protection. Information technology Radio frequency identification systems"

1

Yalcin, Siddika Berna Ors. Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hoepman, Jaap-Henk. Radio Frequency Identification. Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Verbauwhede, Ingrid, and Jaap-Henk Hoepman. Radio Frequency Identification : Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer networks Computer security. Data protection. Information technology Radio frequency identification systems"

1

Loebecke, Claudia. "RFID in the Retail Supply Chain." In Information Security and Ethics, 1923–30. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch130.

Full text
Abstract:
The use of RFID (radio-frequency identification) in the retail supply chain and at the point of sale (POS) holds much promise to revolutionize the process by which products pass from manufacturer to retailer to consumer. The basic idea of RFID is a tiny computer chip placed on pallets, cases, or items. The data on the chip can be read using a radio beam. RFID is a newer technology than bar codes, which are read using a laser beam. RFID is also more effective than bar codes at tracking moving objects in environments where bar code labels would be suboptimal or could not be used as no direct line of sight is available, or where information needs to be automatically updated. RFID is based on wireless (radio) systems, which allows for noncontact reading of data about products, places, times, or transactions, thereby giving retailers and manufacturers alike timely and accurate data about the flow of products through their factories, warehouses, and stores.
APA, Harvard, Vancouver, ISO, and other styles
2

Kaupins, Gundars. "Mobile Computing and Commerce Legal Implications." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 938–43. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch127.

Full text
Abstract:
This article summarizes the present and potential legal constraints of mobile computing and commerce and provides company policy suggestions associated with wireless data collection, dissemination, and storage. The legal constraints focus on major American laws that directly and indirectly involve mobile computing and commerce. Mobile computing is the ability to use wireless devices such as laptops and handheld computers in remote locations to communicate through the Internet or a private network. The technology involves a computer linked to centrally located information or application software through battery powered, portable, and wireless devices (Webopedia.com, 2007b). Mobile commerce uses computer networks to interface with wireless devices such as laptops, handheld computers, or cell phones to help buy goods and services. It is also known as mobile e-commerce, mcommerce, or mcommerce (Webopedia.com, 2007b). Radio frequency identification (RFID) technologies are often a part of mobile commerce. The technologies use radio waves to provide services such as identifying product packaging, paying tolls, purchasing at vending machines, and covertly monitoring employee locations (Grami & Schell, 2007). This article is significant because mobile computing and commerce are expanding at a terrific pace. Laws have been slow to catch up with the new technologies. However, some existing laws on mobile computing and commerce already have a large impact on how communication is disseminated, security and privacy are maintained, and companies develop mobile policies. This article helps corporate managers reduce potential litigation because these mobile laws are described and their implications on company policies disseminated.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography