Open Access. Powered by Scholars. Published by Universities.®

Computational Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

University of North Florida

Articles 1 - 1 of 1

Full-Text Articles in Computational Engineering

Anomaly Detection In Rfid Networks, Alaa Alkadi Jan 2017

Anomaly Detection In Rfid Networks, Alaa Alkadi

UNF Graduate Theses and Dissertations

Available security standards for RFID networks (e.g. ISO/IEC 29167) are designed to secure individual tag-reader sessions and do not protect against active attacks that could also compromise the system as a whole (e.g. tag cloning or replay attacks). Proper traffic characterization models of the communication within an RFID network can lead to better understanding of operation under “normal” system state conditions and can consequently help identify security breaches not addressed by current standards. This study of RFID traffic characterization considers two piecewise-constant data smoothing techniques, namely Bayesian blocks and Knuth’s algorithms, over time-tagged events and compares ...