Detecting Intrusions within RFID Systems through Non-Monotonic Reasoning Cleaning

View/ Open
Author(s)
Darcy, P
Stantic, B
Mitrokotsa, A
Sattar, A
Year published
2010
Metadata
Show full item recordAbstract
Radio Frequency Identification (RFID) technology uses wireless radio technology to automatically track items spanning various locations with little effort or cost. It is used for various applications such as supply chains and health care. Unfortunately, due to the nature of the passive RFID architecture, cloned tags lower the overall accuracy of the system and may allow unauthorised personnel access to sensitive areas/information. To combat this considerable threat, we have proposed a cleaning algorithm designed specifically to identify and flag potential intrusions utilising intelligent analysis coupled with Non-Monotonic ...
View more >Radio Frequency Identification (RFID) technology uses wireless radio technology to automatically track items spanning various locations with little effort or cost. It is used for various applications such as supply chains and health care. Unfortunately, due to the nature of the passive RFID architecture, cloned tags lower the overall accuracy of the system and may allow unauthorised personnel access to sensitive areas/information. To combat this considerable threat, we have proposed a cleaning algorithm designed specifically to identify and flag potential intrusions utilising intelligent analysis coupled with Non-Monotonic Reasoning. We conclude this research by analysing the potential benefits and drawbacks within our proposed methodology.
View less >
View more >Radio Frequency Identification (RFID) technology uses wireless radio technology to automatically track items spanning various locations with little effort or cost. It is used for various applications such as supply chains and health care. Unfortunately, due to the nature of the passive RFID architecture, cloned tags lower the overall accuracy of the system and may allow unauthorised personnel access to sensitive areas/information. To combat this considerable threat, we have proposed a cleaning algorithm designed specifically to identify and flag potential intrusions utilising intelligent analysis coupled with Non-Monotonic Reasoning. We conclude this research by analysing the potential benefits and drawbacks within our proposed methodology.
View less >
Conference Title
Proceedings of the 2010 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010
Copyright Statement
© 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Subject
Data engineering and data science