dc.contributor.convenor | M. Palaniswami | |
dc.contributor.author | Darcy, P | |
dc.contributor.author | Stantic, B | |
dc.contributor.author | Mitrokotsa, A | |
dc.contributor.author | Sattar, A | |
dc.contributor.editor | S. Marusic, M. Palaniswami, J. Gubbi, P. Corke | |
dc.date.accessioned | 2017-05-03T11:26:32Z | |
dc.date.available | 2017-05-03T11:26:32Z | |
dc.date.issued | 2010 | |
dc.date.modified | 2012-09-02T23:17:36Z | |
dc.identifier.isbn | 9781424471768 | |
dc.identifier.refuri | http://www.issnip.org/2010/ | |
dc.identifier.doi | 10.1109/ISSNIP.2010.5706753 | |
dc.identifier.uri | http://hdl.handle.net/10072/37315 | |
dc.description.abstract | Radio Frequency Identification (RFID) technology uses wireless radio technology to automatically track items spanning various locations with little effort or cost. It is used for various applications such as supply chains and health care. Unfortunately, due to the nature of the passive RFID architecture, cloned tags lower the overall accuracy of the system and may allow unauthorised personnel access to sensitive areas/information. To combat this considerable threat, we have proposed a cleaning algorithm designed specifically to identify and flag potential intrusions utilising intelligent analysis coupled with Non-Monotonic Reasoning. We conclude this research by analysing the potential benefits and drawbacks within our proposed methodology. | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.format.extent | 220029 bytes | |
dc.format.mimetype | application/pdf | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.publisher.place | Brisbane | |
dc.relation.ispartofstudentpublication | N | |
dc.relation.ispartofconferencename | International Conference on Intelligent Sensors, Sensor Networks and Information Processing -ISSNIP | |
dc.relation.ispartofconferencetitle | Proceedings of the 2010 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010 | |
dc.relation.ispartofdatefrom | 2010-12-07 | |
dc.relation.ispartofdateto | 2010-12-10 | |
dc.relation.ispartoflocation | Brisbane, Australia | |
dc.relation.ispartofpagefrom | 257 | |
dc.relation.ispartofpageto | 262 | |
dc.rights.retention | Y | |
dc.subject.fieldofresearch | Data engineering and data science | |
dc.subject.fieldofresearchcode | 460501 | |
dc.title | Detecting Intrusions within RFID Systems through Non-Monotonic Reasoning Cleaning | |
dc.type | Conference output | |
dc.type.description | E1 - Conferences | |
dc.type.code | E - Conference Publications | |
gro.faculty | Griffith Sciences, School of Information and Communication Technology | |
gro.rights.copyright | © 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | |
gro.date.issued | 2010 | |
gro.hasfulltext | Full Text | |
gro.griffith.author | Stantic, Bela | |
gro.griffith.author | Sattar, Abdul | |