Technique for preventing DoS attacks on RFID systems

被引:0
|
作者
Faculty of Computer Science, Dalhousie University, Halifax, NS B3H 1W5, Canada [1 ]
机构
关键词
Compendex;
D O I
18th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2010
中图分类号
学科分类号
摘要
Denial-of-service attack
引用
收藏
相关论文
共 50 条
  • [1] Preventing DoS attacks in peer-to-peer media streaming systems
    Conner, W
    Nahrstedt, K
    Gupta, I
    MULTIMEDIA COMPUTING AND NETWORKING 2006, 2006, 6071
  • [2] Design of an extended TCP for preventing DoS attacks
    Park, ZW
    Lee, JH
    Kim, MK
    KORUS 2003: 7TH KOREA-RUSSIA INTERNATIONAL SYMPOSIUM ON SCIENCE AND TECHNOLOGY, VOL 2, PROCEEDINGS: ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY, 2003, : 385 - 389
  • [3] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [4] Recent Techniques Used for Preventing DOS Attacks in VANETs
    Adhikary, Kaushik
    Bhushan, Shashi
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 564 - 569
  • [5] Revisiting DoS Attacks and Privacy in RFID-Enabled Networks
    D'Arco, Paolo
    Scafuro, Alessandra
    Visconti, Ivan
    ALGORITHMIC ASPECTS OF WIRELESS SENSOR NETWORKS, 2009, 5804 : 76 - 87
  • [6] Classification of DOS Attacks Using Visualization Technique
    Cheikh, Mohamed
    Hacini, Salima
    Boufaida, Zizette
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (02) : 19 - 32
  • [7] Detecting DoS attacks on SIP systems
    Chen, Eric Y.
    VoIP MaSe 06: 1st IEEE Workshop on VoIP Management and Security: SECURING AND MANAGING VOIP COMMUNICATIONS, 2006, : 53 - 58
  • [8] DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols
    Chien, Hung-Yu
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 615 - 622
  • [9] Preventing SYN Flood DoS Attacks (Abstract) An Improvement to SYN Cookies
    KhakAbi, Sahand
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 235 - 235
  • [10] A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks
    Mohi, Maryam
    Movaghar, Ali
    Zadeh, Pooya Moradian
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 507 - 511