Show simple item record

dc.contributor.convenorM. Palaniswami
dc.contributor.authorDarcy, P
dc.contributor.authorStantic, B
dc.contributor.authorMitrokotsa, A
dc.contributor.authorSattar, A
dc.contributor.editorS. Marusic, M. Palaniswami, J. Gubbi, P. Corke
dc.date.accessioned2017-05-03T11:26:32Z
dc.date.available2017-05-03T11:26:32Z
dc.date.issued2010
dc.date.modified2012-09-02T23:17:36Z
dc.identifier.isbn9781424471768
dc.identifier.refurihttp://www.issnip.org/2010/
dc.identifier.doi10.1109/ISSNIP.2010.5706753
dc.identifier.urihttp://hdl.handle.net/10072/37315
dc.description.abstractRadio Frequency Identification (RFID) technology uses wireless radio technology to automatically track items spanning various locations with little effort or cost. It is used for various applications such as supply chains and health care. Unfortunately, due to the nature of the passive RFID architecture, cloned tags lower the overall accuracy of the system and may allow unauthorised personnel access to sensitive areas/information. To combat this considerable threat, we have proposed a cleaning algorithm designed specifically to identify and flag potential intrusions utilising intelligent analysis coupled with Non-Monotonic Reasoning. We conclude this research by analysing the potential benefits and drawbacks within our proposed methodology.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent220029 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoeng
dc.publisherIEEE
dc.publisher.placeBrisbane
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofconferencenameInternational Conference on Intelligent Sensors, Sensor Networks and Information Processing -ISSNIP
dc.relation.ispartofconferencetitleProceedings of the 2010 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010
dc.relation.ispartofdatefrom2010-12-07
dc.relation.ispartofdateto2010-12-10
dc.relation.ispartoflocationBrisbane, Australia
dc.relation.ispartofpagefrom257
dc.relation.ispartofpageto262
dc.rights.retentionY
dc.subject.fieldofresearchData engineering and data science
dc.subject.fieldofresearchcode460501
dc.titleDetecting Intrusions within RFID Systems through Non-Monotonic Reasoning Cleaning
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.facultyGriffith Sciences, School of Information and Communication Technology
gro.rights.copyright© 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
gro.date.issued2010
gro.hasfulltextFull Text
gro.griffith.authorStantic, Bela
gro.griffith.authorSattar, Abdul


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record