Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography

In Zaigham Mahmood (ed.), Security, Privacy and Trust in the Iot Environment. Springer Verlag. pp. 39-60 (2019)
  Copy   BIBTEX

Abstract

The widespread use of IoT devices that rely on Radio Frequency IDentification of an incorrect computational result, is exponentially small. This has a significant impact on the adoption of the said technologies in fields and areas where the use of RFID technology has not been considered. The solutions proposed in this chapter enable RFID technology to be more secure and be part of the IoT vision as a trusted technology, which can be adopted in any field globally without having concerns regarding privacy, security, and trust.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,497

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

RFID: The next serious threat to privacy. [REVIEW]Vance Lockton & Richard S. Rosenberg - 2005 - Ethics and Information Technology 7 (4):221-231.
Nanotechnology and Privacy.Jeroen van den Hoven - 2006 - International Journal of Applied Philosophy 20 (2):215-228.

Analytics

Added to PP
2020-06-17

Downloads
3 (#1,717,410)

6 months
2 (#1,206,551)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references