Framework for Security and Privacy in RFID based Telematics

Provided by: Academic Hosting & Event Management Solutions
Topic: Mobility
Format: PDF
Telematics by its nature requires the capture of sensor data, storage and exchange of data to obtain remote services. Most of the commercial antivirus software fail to detect unknown and new malicious code. Proliferation of malicious code (viruses, worms, Trojans, root kits, spyware, crime ware, phishing attacks, and other malware designed to infiltrate or damage a system without user's consent) in recent years has presented a serious threat to Internet, individual users, and enterprises alike. In addition malware once confined to wired networks has now found a new breeding ground in mobile devices, Automatic IDentification and Collection (AIDC) technologies, and Radio Frequency IDentification devices (RFID) that use wireless networks to communicate and connect to the Internet.

Find By Topic