An Ontology-based Intrusion Detection for RFID Systems (Contributo in volume (capitolo o saggio))

Type
Label
  • An Ontology-based Intrusion Detection for RFID Systems (Contributo in volume (capitolo o saggio)) (literal)
Anno
  • 2010-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1007/978-90-481-9151-2_81 (literal)
Alternative label
  • Massimo Esposito; Gennaro Della Vecchia (2010)
    An Ontology-based Intrusion Detection for RFID Systems
    Springer Science+Business Media, Berlin, Heidelberg (Germania) in Technological Developments in Networking, Education and Automation, 2010
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Massimo Esposito; Gennaro Della Vecchia (literal)
Pagina inizio
  • 467 (literal)
Pagina fine
  • 472 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://dx.doi.org/10.1007/978-90-481-9151-2_81 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#titoloVolume
  • Technological Developments in Networking, Education and Automation (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
  • 10.1007/978-90-481-9151-2_81 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
  • 6 (literal)
Note
  • Google Scholar (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • ICAR-CNR, Via P. Castellino 111, 80131 Naples, Italy (literal)
Titolo
  • An Ontology-based Intrusion Detection for RFID Systems (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 978-90-481-9150-5 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#curatoriVolume
  • Khaled Elleithy; Tarek Sobh; Magued Iskander; Vikram Kapila; Mohammad A. Karim; Ausif Mahmood (literal)
Abstract
  • In the last decade, RFID systems have gained increasing popularity, but they also pose many critical security concerns. The most challenging security threat in several RFID applications is tag cloning. In this paper, we do not focus on preventing tag cloning, but propose the application of the intrusion detection model to identify when tag cloning has occurred. In particular, we present an ontology-based misuse detection system (IDS) that integrates information coming from RFID middleware layer to detect tag cloning. Ontologies and rules are applied to formalize the declarative and procedural knowledge required to implement a \"track & trace\" technique, with the final aim of modelling two levels of detection against tag cloning. An inference engine is used to provide the proposed IDS with the advanced capacity of automatically reasoning about ontologies and rules in order to actually apply the formalized model of detection and infer when a tagged object is cloned or victim of a cloning attack. (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Editore di
Insieme di parole chiave di
data.CNR.it