An overview of privacy and security issues in the internet of things

CM Medaglia, A Serbanati - The Internet of Things: 20 th Tyrrhenian …, 2010 - Springer
While the general definition of the Internet of Things (IoT) is almost mature, roughly defining
it as an information network connecting virtual and physical objects, there is a consistent …

RFID applications and security review

C Munoz-Ausecha, J Ruiz-Rosero… - Computation, 2021 - mdpi.com
Radio frequency identification (RFID) is widely used in several contexts, such as logistics,
supply chains, asset tracking, and health, among others, therefore drawing the attention of …

A comprehensive review of elderly fall detection using wireless communication and artificial intelligence techniques

SK Gharghan, HA Hashim - Measurement, 2024 - Elsevier
Falls among older adults substantially affect mobility, health, and mortality. However,
advancements in wireless and internet-of-things technologies have led to the development …

A comprehensive RFID solution to enhance inpatient medication safety

P Peris-Lopez, A Orfila, A Mitrokotsa… - international journal of …, 2011 - Elsevier
Errors involving medication administration can be costly, both in financial and in human
terms. Indeed, there is much potential for errors due to the complexity of the medication …

Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol

D He, N Kumar, N Chilamkurti, JH Lee - Journal of medical systems, 2014 - Springer
The radio frequency identification (RFID) technology has been widely adopted and being
deployed as a dominant identification technology in a health care domain such as medical …

Securing RFID systems conforming to EPC Class 1 Generation 2 standard

TC Yeh, YJ Wang, TC Kuo, SS Wang - Expert systems with applications, 2010 - Elsevier
RFID, capable of remote automatic identification, is taking the place of barcodes to become
electronic tags of the new generation. However, the information transmitted in the air could …

[PDF][PDF] Internet of things: A new application for intelligent traffic monitoring system

L Xiao, Z Wang - Journal of networks, 2011 - researchgate.net
Constructing an intelligent traffic monitoring system firstly depends on automatic
identification for vehicles. At present, automatic identification technology based on image …

A review and analysis of secure and lightweight ECC‐based RFID authentication protocol for Internet of Vehicles

S Kumar, H Banka, B Kaushik… - Transactions on …, 2021 - Wiley Online Library
Radio‐frequency identification (RFID) technology has proliferated over the last few years
and being deployed as identification technology in numerous domains like intelligent …

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems

R Doss, S Sundaresan, W Zhou - Ad Hoc Networks, 2013 - Elsevier
In this paper we propose a novel approach to authentication and privacy in mobile RFID
systems based on quadratic residues and in conformance to EPC Class-1 Gen-2 …

[图书][B] Security in RFID and sensor networks

P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …