透過您的圖書館登入
IP:3.21.97.61
本篇文章尚未正式出版,請點選「加入追蹤」跟進後續出版資訊!

並列摘要


The recent practical deployment of radio frequency identification (RFID) technologies is becoming widespread in almost all kinds of wireless network-based applications. As anticipated, most of the applications based on sensor networks, ad-hoc and or mobile ad hoc networks (MANETs) can highly benefit from the adoption of RFID solutions. RFID tags store valuable information and can easily be subjected to unauthorized reading, tempering with and possible other uses, which can lead to many unknown activities. RFID tags are also vulnerable to different forms of relay attacks. In this article, we present a probabilistic approach to check and verify the flexibility of the RFID protocols against possible relay attacks, channels and application specific parameters are also considered in the analysis. Then we show how an attack can be avoided. Future work is presented at the conclusion.

並列關鍵字

RFID Security Product code Relay attacks Intelligent systems

延伸閱讀