Classifying RFID attacks and defenses

@article{Mitrokotsa2010ClassifyingRA,
  title={Classifying RFID attacks and defenses},
  author={Aikaterini Mitrokotsa and Melanie R. Rieback and Andrew S. Tanenbaum},
  journal={Information Systems Frontiers},
  year={2010},
  volume={12},
  pages={491-505}
}
RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features… 
Security Issues in RFID
TLDR
The aim of the paper is to introduce and categorize the existing security issues of RFID, so that a better understanding ofRFID threats can be achieved, and subsequently more efficient and effective algorithms, techniques and approaches to overcome these threats may be developed.
Security analysis of EPC-enabled RFID network
  • B. Liu, C. Chu
  • Computer Science
    2010 IEEE International Conference on RFID-Technology and Applications
  • 2010
TLDR
This paper examines the vulnerabilities and threats of the EPCglobal standard and infrastructure in supply networks and presents the possible countermeasures.
RFID Exploitation and Countermeasures
TLDR
Given the exceptional capabilities and utilities of RFID devices, this paper has focused on security measures and defenses for protecting them, such as Active Jamming, Shielding tag, and Authentication.
Threats to Networked RFID Systems
TLDR
The goal of this chapter is to present a more global overview of RFID threats, using clearly defined and widely accepted concepts from both the RFID area and classical risk analysis to structure this overview.
RFID Security Threats and Basic Solutions
TLDR
This chapter surveys the existing security threats and their primitive solutions that do not consider cryptography and discusses the physical system security solutions and the basic authentication techniques that ensure the valid identity of the communicating parties.
A Survey on Attacks in RFID Networks
TLDR
RFID architecture is introduced, different existing attacks which threat security and privacy of RFID applications are described, and existing countermeasures that are proposed by different researchers are discussed.
Classification of RFID Threats based on Security Principles
TLDR
The goal of this chapter is to present a more global overview of RFID threats, using clearly defined and widely accepted concepts from both the RFID area and classical risk analysis to structure this overview.
The RFID’s Security with a critical view
TLDR
This paper considers appropriate techniques and protocols that can fix security problems of the RFID and points RFIDs cracking methods.
RFID Security Issues
TLDR
Some thoughts on security issues concerning RFID systems are provided and some of the areas that have to be considered regarding this topic are highlighted.
Security Vulnerabilities in RFID Networks
TLDR
The researcher explains existing security challenges in RFID networks then the effects of these threats on security and privacy of RFID are discussed and different countermeasures that are proposed by other researchers are discussed.
...
...

References

SHOWING 1-10 OF 110 REFERENCES
RFID Security: A Taxonomy of Risk
TLDR
A taxonomy for classifying the security risks associated with RFID systems is proposed and is proposed to support the automation of business processes that are critical to the success of the organization.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
TLDR
Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.
Cryptographic Approach to “Privacy-Friendly” Tags
TLDR
This paper discusses and clarifies the requirements and restrictions of RFID systems, and suggests the use of the previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism.
Strong Authentication for RFID Systems Using the AES Algorithm
TLDR
A novel approach of an AES hardware implementation which encrypts a 128-bit block of data within 1000 clock cycles and has a power consumption below 9 μA on a 0.35 μm CMOS process is introduced.
RFID: Practical attacks against RFID
Some Methods for Privacy in RFID Communication
TLDR
It is shown that a simple metric analogous to signal to noise ratio correlates well with rough distance and can be used to estimate reader distance (and hence trust) and a key aspect of RFID communication with passive tags, namely its required energy transference from an external antenna, may offer promise when developing privacy mechanisms.
RFID-Tags for Anti-counterfeiting
TLDR
It is shown that a PUF based solution for RFID-tags is feasible in the off-line case and the security protocols that are needed for the detection of the authenticity of a product when it is equipped with such a system are presented.
Security and Privacy in Radio-Frequency Identification Devices
Radio Frequency Identification (RFID) systems are a common and useful tool in manufacturing, supply chain management and retail inventory control. Optical barcodes, another common automatic
Roadmap to solving security and privacy concerns in RFID systems
  • J. Ayoade
  • Computer Science
    Comput. Law Secur. Rev.
  • 2007
Minimalist Cryptography for Low-Cost RFID Tags
TLDR
It is shown that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices, and a new security model for authentication and privacy in RFID tags is proposed, which involves no computationally intensive cryptographic operations, and relatively little storage.
...
...