Show simple item record

dc.contributor.convenorM. Palaniswamien_US
dc.contributor.authorDarcy, Peteren_US
dc.contributor.authorStantic, Belaen_US
dc.contributor.authorMitrokotsa, Aikaterinien_US
dc.contributor.authorSattar, Abdulen_US
dc.contributor.editorS. Marusic, M. Palaniswami, J. Gubbi, P. Corkeen_US
dc.date.accessioned2017-04-24T08:20:13Z
dc.date.available2017-04-24T08:20:13Z
dc.date.issued2010en_US
dc.date.modified2012-09-02T23:17:36Z
dc.identifier.refurihttp://www.issnip.org/2010/en_US
dc.identifier.doi10.1109/ISSNIP.2010.5706753en_US
dc.identifier.urihttp://hdl.handle.net/10072/37315
dc.description.abstractRadio Frequency Identification (RFID) technology uses wireless radio technology to automatically track items spanning various locations with little effort or cost. It is used for various applications such as supply chains and health care. Unfortunately, due to the nature of the passive RFID architecture, cloned tags lower the overall accuracy of the system and may allow unauthorised personnel access to sensitive areas/information. To combat this considerable threat, we have proposed a cleaning algorithm designed specifically to identify and flag potential intrusions utilising intelligent analysis coupled with Non-Monotonic Reasoning. We conclude this research by analysing the potential benefits and drawbacks within our proposed methodology.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_US
dc.format.extent220029 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglishen_US
dc.language.isoen_US
dc.publisherIEEEen_US
dc.publisher.placeBrisbaneen_US
dc.relation.ispartofstudentpublicationNen_US
dc.relation.ispartofconferencenameInternational Conference on Intelligent Sensors, Sensor Networks and Information Processing -ISSNIPen_US
dc.relation.ispartofconferencetitleProceedings of the 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processingen_US
dc.relation.ispartofdatefrom2010-12-07en_US
dc.relation.ispartofdateto2010-12-10en_US
dc.relation.ispartoflocationBrisbane, Australiaen_US
dc.rights.retentionYen_US
dc.subject.fieldofresearchData Format not elsewhere classifieden_US
dc.subject.fieldofresearchcode080499en_US
dc.titleDetecting Intrusions within RFID Systems through Non-Monotonic Reasoning Cleaningen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.facultyGriffith Sciences, School of Information and Communication Technologyen_US
gro.rights.copyrightCopyright 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en_US
gro.date.issued2010
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record