2021
DOI: 10.5937/vojtehg69-28114
|View full text |Cite
|
Sign up to set email alerts
|

Identification of soldiers and weapons in military armory based on comparison image processing and RFID tag

Abstract: Introduction/purpose: The process of issuing and retrieving weapons in the military should be fast enough and should provide immediate availability of accurate information on the status of weapons. Methods: This paper deals with the problem of digitizing the recording of issuing and returning weapons through the use of modern Edge computing technology. The problem is presented through two approaches. The first approach is based on the application of machine learning algorithms for recognizing the serial number… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The solution involves military personnel authentication via biometrics, including fingerprints and iris scans. A reader can read the tag affixed to the weapon and update its status, e.g., Returned or Checked-Out [19]. As RFID technology is susceptible to spoofing and tracking attacks, the same technology can be utilised by adversaries, as items (such as weapons) can be tracked, thereby recording the location and movement of each item if not secured properly.…”
Section: Maritime Rfid Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The solution involves military personnel authentication via biometrics, including fingerprints and iris scans. A reader can read the tag affixed to the weapon and update its status, e.g., Returned or Checked-Out [19]. As RFID technology is susceptible to spoofing and tracking attacks, the same technology can be utilised by adversaries, as items (such as weapons) can be tracked, thereby recording the location and movement of each item if not secured properly.…”
Section: Maritime Rfid Applicationsmentioning
confidence: 99%
“…To the best of our knowledge, minimal work has been conducted within the area addressing the security around RFID protocols utilised in the maritime domain. Research typically focuses on the application or use cases where the technology is applied but does not cover the security component [17][18][19][20][21][22]. This paper summarises applications of RFID technology in the maritime sector and explores its vulnerabilities in realistic use cases.…”
mentioning
confidence: 99%