• Peter Darcy Peter Darcy
  • Bela Stantic Bela Stantic
  • Aikaterini Mitrokotsa Aikaterini Mitrokotsa
  • Abdul Sattar Abdul Sattar

Radio Frequency Identification (RFID) technology uses wireless radio technology to automatically track items spanning various locations with little effort or cost. It is used for various applications such as supply chains and health care. Unfortutely, due to the ture of the passive RFID architecture, cloned tags lower the overall accuracy of the system and may allow uuthorised personnel access to sensitive areas/information. To combat this considerable threat, we have proposed a cleaning algorithm designed specifically to identify and flag potential intrusions utilising intelligent alysis coupled with Non-Monotonic Reasoning. We conclude this research by alysing the potential benefits and drawbacks within our proposed methodology.

Presented at Conferences

  • International Conference on Intelligent Sensors, Sensor Networks and Information Processing -ISSNIP (2010)

    Brisbane, Australia