http://www.cnr.it/ontology/cnr/individuo/prodotto/ID133671
An Ontology-based Intrusion Detection for RFID Systems (Contributo in volume (capitolo o saggio))
- Type
- Label
- An Ontology-based Intrusion Detection for RFID Systems (Contributo in volume (capitolo o saggio)) (literal)
- Anno
- 2010-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1007/978-90-481-9151-2_81 (literal)
- Alternative label
Massimo Esposito; Gennaro Della Vecchia (2010)
An Ontology-based Intrusion Detection for RFID Systems
Springer Science+Business Media, Berlin, Heidelberg (Germania) in Technological Developments in Networking, Education and Automation, 2010
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- Massimo Esposito; Gennaro Della Vecchia (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
- http://dx.doi.org/10.1007/978-90-481-9151-2_81 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#titoloVolume
- Technological Developments in Networking, Education and Automation (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
- 10.1007/978-90-481-9151-2_81 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
- Note
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- ICAR-CNR, Via P. Castellino 111, 80131 Naples, Italy (literal)
- Titolo
- An Ontology-based Intrusion Detection for RFID Systems (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
- 978-90-481-9150-5 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#curatoriVolume
- Khaled Elleithy; Tarek Sobh; Magued Iskander; Vikram Kapila; Mohammad A. Karim; Ausif Mahmood (literal)
- Abstract
- In the last decade, RFID systems have gained
increasing popularity, but they also pose many critical security
concerns. The most challenging security threat in several RFID
applications is tag cloning. In this paper, we do not focus on
preventing tag cloning, but propose the application of the
intrusion detection model to identify when tag cloning has
occurred. In particular, we present an ontology-based misuse
detection system (IDS) that integrates information coming from
RFID middleware layer to detect tag cloning. Ontologies and rules
are applied to formalize the declarative and procedural
knowledge required to implement a \"track & trace\" technique,
with the final aim of modelling two levels of detection against tag
cloning. An inference engine is used to provide the proposed IDS
with the advanced capacity of automatically reasoning about
ontologies and rules in order to actually apply the formalized
model of detection and infer when a tagged object is cloned or
victim of a cloning attack. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Editore di
- Insieme di parole chiave di