Review of the Medical Internet of Things-Based RFID Security Protocols

2021 ◽  
pp. 163-178
Author(s):  
Nagarjuna Telagam ◽  
Nehru Kandasamy
Author(s):  
Ahmed Khattab ◽  
Zahra Jeddi ◽  
Esmaeil Amini ◽  
Magdy Bayoumi

2018 ◽  
Vol 89 ◽  
pp. 110-125 ◽  
Author(s):  
Ashok Kumar Das ◽  
Sherali Zeadally ◽  
Debiao He

In this era of technological advances, it will be impractical to think of a day without the usage of gadgets. Development and popularity of the Internet of Things have helped mankind a lot in several ways, but at the same time, there has also been an increase in attacks invading the underlying security. Advances in studies have resulted in the development of evolved algorithms that can be used in order to reduce the attacks and threats to the Internet of Things. With several advancements in studies and research works, the security measures on various Internet of Things based components and protocols are developing with time, but concurrently more advanced threats and attacks on these components are also evolving. These attacks are not only harmful to the components, but rather they also affect the users and applications that are associated with it, by breaching data, increase in inconsistency and inaccuracy, and many more. This work deals with the study of several attacks that are associated with the Internet of Things and also the approaches to secure the IoT systems. This work will also help in coming up with further up-gradation in the currently implemented security protocols and also in predicting the possible attacks that can be developed against the IoT protocols.


Author(s):  
Swabhiman Choudhury ◽  
Rakesh Kumar Lenka ◽  
Rabindra Kumar Barik ◽  
Nagen Chandan Panda

2019 ◽  
Vol 8 (4) ◽  
pp. 7167-7170

Nowadays, for the purpose of investigate in any field; internet of things (IoT) occupies the main themes since datum that IoT has communications between different things, articles and gadgets. In numerous fields, for example, designs, security, protocols, communications and so forth. There have been many improvements and advancements are accomplished by these associations. The primary point of IoT is building a maintained security among objects and furthermore guarantee the talented communications among them by utilizing different sorts of applications. Mixed Network designs play a fundamental job in present day world correspondence that is for all intentions and determinations all interchanges and mystery asset exchanges are broadly relying upon the heterogeneous system engineering. Be that as it may, the current Intrusion location frameworks have various obstructions in framework effectiveness, security, protection, adaptability and versatility. Hence, Block chain innovation has been worried to give the security of information and save the protection of the information by forestalling the unapproved get to. It can bear the charge of high security, without trade of mean worth. The square chain guarantees high protection from assaults. The work proposed is another push to progress the current safety of the diverse design, and it tends to be most valuable in verified IoT.


Author(s):  
Сергей Александрович Ермаков ◽  
Андрей Сергеевич Тулинов ◽  
Андрей Александрович Болгов ◽  
Валерий Константинович Власов

В данной статье предлагается методика повышения защищенности сетей и конечных устройств интернета вещей от атак, направленных на нарушение конфиденциальности информации и процедуры аутентификации, за счет внедрения новых несертифицированных протоколов обеспечения безопасности и создания методического обеспечения для оценки рисков успешной реализации атак. В работе были смоделированы и проанализированы протоколы безопасности технологии интернета вещей с помощью специализированного инструмента моделирования. При использовании результатов моделирования для всех протоколов, представленных в данной работе, был посчитан риск успешной реализации атак, направленных на нарушение конфиденциальности информации и процедуры аутентификации. На основе полученных значений было выполнено сравнение протоколов безопасности. Результаты проделанной работы позволят упростить разработку и внедрение новых протоколов безопасности для технологии интернета вещей. This article proposes a method for improving the security of the networks and end devices of the Internet of Things from attacks aimed at violating the confidentiality of information and authentication procedures by introducing new uncertified security protocols and creating methodological support for assessing the risks of successful implementation of attacks. The security protocols of the Internet of Things technology were modeled and analyzed using a specialized modeling tool. When using the simulation results for all the protocols presented in this work, the risk of successful implementation of attacks aimed at violating the confidentiality of information and the authentication procedure was calculated. Based on the obtained values, a comparison of security protocols was performed. The results of this work will simplify the development and implementation of new security protocols for the Internet of Things technology.


2012 ◽  
Vol 6 (3) ◽  
pp. 56-74 ◽  
Author(s):  
Azam Zavvari ◽  
Ahmed Patel

Radio Frequency Identification (RFID) system is a low-cost contactless automatic identification technology; and barcode as a traditional technology is now broadly replaced by RFID systems to make objects more manageable in supply chains and other enterprises. This technology is operational in open wireless communication spaces whereby its transmission signals can be easily accessed resulting in security problems. Consequently, it becomes an absolute necessity to develop efficient security protocols to protect the data against various attacks. This paper outlines a critical evaluation of the RFID systems, the security and privacy issues in the RFID security protocols, the EPCglobal Class-1 Generation-2 standard as it is an international standard, its lower cost of implementation, and high speed data transmission and operation.


Sign in / Sign up

Export Citation Format

Share Document