Acquiring RFID tag asymmetric key from IoT cyber physical environment

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio Frequency Identification (RFID) is the example of current technology that enable the IoT environment to identify and locate objects and record metadata. RFID is the typical, important technology that first creates the term of IoT and most recent technology discussed. Since the close relationship of the evolution between technology and crime, the need of understanding RFID data is inevitable. There is some researcher discussed of IoT forensic but there is no specific work related to the RFID data acquisition standard procedure in IOT environment. Therefore, this research is to propose a methodology for acquisition of RFID tag asymmetric key for IoT forensic purpose. Acquisition is the initial step in IoT forensic to acquire digital evidence from IoT cyberphysical environment. Later, the key acquired will be used to extract useful information from RFID tag memory for further investigation.

Cite

CITATION STYLE

APA

Razak, M. T. A., Abdullah, N. A., & Rahman, N. H. A. (2019). Acquiring RFID tag asymmetric key from IoT cyber physical environment. In Advances in Intelligent Systems and Computing (Vol. 843, pp. 538–547). Springer Verlag. https://doi.org/10.1007/978-3-319-99007-1_50

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free