Classifying RFID attacks and defenses

@article{Mitrokotsa2010ClassifyingRA,
  title={Classifying RFID attacks and defenses},
  author={Aikaterini Mitrokotsa and Melanie R. Rieback and Andrew S. Tanenbaum},
  journal={Information Systems Frontiers},
  year={2010},
  volume={12},
  pages={491-505}
}
RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features… Expand
Security Issues in RFID
RFID (Radio Frequency IDentification) are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among theirExpand
Security analysis of EPC-enabled RFID network
  • B. Liu, C. Chu
  • Computer Science
  • 2010 IEEE International Conference on RFID-Technology and Applications
  • 2010
TLDR
This paper examines the vulnerabilities and threats of the EPCglobal standard and infrastructure in supply networks and presents the possible countermeasures. Expand
Threats to Networked RFID Systems
TLDR
The goal of this chapter is to present a more global overview of RFID threats, using clearly defined and widely accepted concepts from both the RFID area and classical risk analysis to structure this overview. Expand
RFID Security Threats and Basic Solutions
TLDR
This chapter surveys the existing security threats and their primitive solutions that do not consider cryptography and discusses the physical system security solutions and the basic authentication techniques that ensure the valid identity of the communicating parties. Expand
A Survey on Attacks in RFID Networks
Today, RFID applications are going to be ubiquitous and an importance of security and privacy of these applications are increasing day by day. By considering security and privacy issues in RFIDExpand
RFID Security Issues
TLDR
Some thoughts on security issues concerning RFID systems are provided and some of the areas that have to be considered regarding this topic are highlighted. Expand
Classification of RFID Threats based on Security Principles
RFID technology is an area currently undergoing active development. An issue, which has received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of RFIDExpand
Security Analysis for UHF RFID Tags
  • Xinwei Liu, Y. Sun, J. Liu
  • Computer Science
  • 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
  • 2014
TLDR
This paper analyzes the vulnerabilities of memory banks, detail the treats of the vulnerabilities in the cases of different numbers of tags and different distances between tags and readers, and design attack cases to verify the weaknesses in reading and writing operation of tags. Expand
Security Risks Associated with Radio Frequency Identification in Medical Environments
TLDR
An overview of these security threats present in RFID systems in a medical environment is presented and guidance on potential solutions to these threats is provided. Expand
Identification of UHF Gen 2 RFID privacy and security issues
  • K. Deepika, J. Usha
  • Engineering
  • 2015 International Conference on Radar, Antenna, Microwave, Electronics and Telecommunications (ICRAMET)
  • 2015
Radio frequency identification (RFID) is a non-wired electromagnetic transmission to communicate between an end terminal and a chip-less tag with the principle of identification. Privacy protectionExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 110 REFERENCES
RFID Security: A Taxonomy of Risk
TLDR
A taxonomy for classifying the security risks associated with RFID systems is proposed and is proposed to support the automation of business processes that are critical to the success of the organization. Expand
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
TLDR
Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested. Expand
Cryptographic Approach to “Privacy-Friendly” Tags
TLDR
This paper discusses and clarifies the requirements and restrictions of RFID systems, and suggests the use of the previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism. Expand
Strong Authentication for RFID Systems Using the AES Algorithm
TLDR
A novel approach of an AES hardware implementation which encrypts a 128-bit block of data within 1000 clock cycles and has a power consumption below 9 μA on a 0.35 μm CMOS process is introduced. Expand
RFID: Practical attacks against RFID
Radio frequency identification isn't new. The basic concepts have been around since the 1940s, but thanks to economies of scale, better manufacturing processes and more capable back-end dataExpand
Some Methods for Privacy in RFID Communication
TLDR
It is shown that a simple metric analogous to signal to noise ratio correlates well with rough distance and can be used to estimate reader distance (and hence trust) and a key aspect of RFID communication with passive tags, namely its required energy transference from an external antenna, may offer promise when developing privacy mechanisms. Expand
RFID-Tags for Anti-counterfeiting
TLDR
It is shown that a PUF based solution for RFID-tags is feasible in the off-line case and the security protocols that are needed for the detection of the authenticity of a product when it is equipped with such a system are presented. Expand
Security and Privacy in Radio-Frequency Identification Devices
Radio Frequency Identification (RFID) systems are a common and useful tool in manufacturing, supply chain management and retail inventory control. Optical barcodes, another common automaticExpand
Roadmap to solving security and privacy concerns in RFID systems
  • J. Ayoade
  • Computer Science
  • Comput. Law Secur. Rev.
  • 2007
TLDR
It is argued that users/consumers of RFID systems should be given the mandate to have control over their products and systems and in order to fully address solution to the security concerns. Expand
Minimalist Cryptography for Low-Cost RFID Tags
TLDR
It is shown that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices, and a new security model for authentication and privacy in RFID tags is proposed, which involves no computationally intensive cryptographic operations, and relatively little storage. Expand
...
1
2
3
4
5
...