Dr JKR Sastry, N. Venkatram, Y. Pavan Kumar, N. Rajesh Babu, have authored a paper and was published in International Journal of Mobile & Adhoc Network
Tag is a small embedded system meant for identification of an object to which it is attached and in addition the TAGS can be made to be intelligent such that they can identify its own location, alert the master about an event occurring in its vicinity, sensing tampering with its own etc. For implementing any of the intelligence within the Tag, the TAG must communicate with a remote HOST which in this case is the Mobile Device. Tags can communicate with the HOST by using the available interface at either end for transmitting the data from the TAG side and for receiving commands from the HOST. The communication system as such is vulnerable and therefore can be attacked. In this paper various attacking and counter attacking mechanisms are discussed and an efficient method of securing the communication between the TAG and the HOST is presented.
Key words: Tag, Mobile Device, Security, Intelligence.