Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

Security and Access Control White Papers

  • Previous Page
  • 1
  • Next Page
  • Demystifying IoT Cybersecurity
    Published September 2017
    The Internet of Things introduces new vulnerabilities across the entire ecosystem. Here's what you need to know and prepare for, courtesy of the IoT Cybersecurity Alliance.
  • iDTRONIC GmbH Provides Burg F.W. Lüling KG With Embedded Modules
    Published February 2017
    Last year, Burg F.W. Lüling KG, a manufacturer of locks and locking systems, entered into a partnership with iDTRONIC GmbH, a provider of RFID hardware. This case study discusses the embeddable high-frequency (HF) module that iDTRONIC supplied to Burg, providing it with greater flexibility than its previous low-frequency (LF) RFID system allowed. (3 pages)
  • Internet of Things Security and Privacy Recommendations
    Published December 2016
    The Broadband Internet Technical Advisory Group (BITAG) highlights a number of issues that contribute to the lack of privacy and security on Internet of Things devices—ranging from an absence of IoT supply chain experience to a shortage of secure network software updates to malware insertions during manufacturing. (43 pages)
  • Security Solutions and Services for the IoT
    Published May 2016
    Security is a major industry concern that could significantly slow Internet of Things market growth. IoT security is a multi-layered problem, with the added complexity of practical implementation challenges arising from supplier diversity and legacy systems. Gemalto's François Ennesser and InterDigital's Yogendra Shah explain how the global oneM2M standard provides a horizontal architecture for common IoT application-enablement services, such as security. With the oneM2M architecture, IoT application developers and service providers can collaborate within a common security framework to enable multiple IoT applications using shared service resources. (9 pages)
  • Simplifying Security for IoT Device Engineers and Manufacturers
    Published May 2016
    The idea of providing network security to legacy embedded systems and the latest IoT devices is taking hold in the marketplace, but most vendors offer a single component, like a secure boot or a simple encrypted connection, without addressing other common attack vectors. The lack of product depth among software vendors is forcing engineers to integrate a confusing array of components from many sources, only to find that they do not play well together or impose an unwieldy demand on scarce system resources. Icon Labs' Dave West outlines four device classes with common security concerns. (5 pages)
  • Performance Analysis of an RFID Prototype System to Control Personnel Access
    Published February 2015
    Yaneth Patricia López Mutis, Lucero Marisol Manquillo Lagos and Víctor Fabián Miramá Pérez present their analysis of a prototype UHF RFID system for controlling personnel access in the Mayor's Office of Popayán, Colombia. (6 pages)
  • Best IT Asset Management Through Smart RFID Software
    Published December 2013
    Art Barton, RFTrail's director of RFID strategies, discusses how CIOs, finance managers, IT managers and others responsible for managing the IT assets of their organizations are experiencing the pressure to cut costs, enhance IT asset security, increase regulatory compliance and improve their IT asset-auditing procedures. In response to these growing demands, organizations are increasingly turning to RFID-enabled IT asset-tracking and management systems to help achieve these goals.
  • Previous Page
  • 1
  • Next Page
PREMIUM CONTENT
Case Studies Features Best Practices How-Tos
RFID JOURNAL EVENTS
Live Events Virtual Events Webinars
ASK THE EXPERTS
Simply enter a question for our experts.
TAKE THE POLL
JOIN THE CONVERSATION ON TWITTER
Loading
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations