A framework for assessing RFID system security and privacy risks

被引:48
作者
Rotter, Pawel [1 ]
机构
[1] Joint Res Ctr European Commission Seville, Inst Prospect Technol Studies, Seville, Spain
关键词
Privacy; RFID; Security;
D O I
10.1109/MPRV.2008.22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Radio Frequency Identification systems (RFID) is a powerful technology with numerous application possibilities, but it is also a technology that raises serious privacy and security risks. RFID-based systems are subject to generic attack that threaten system security and user privacy, like all information systems and there are also many attacks that specifically target RFID system technologies. The countermeasures are to encrypt the data and to use a metal screen to shield the tag and reader during information exchange. The communication looks as if the legitimate tag and the reader are close to each other, when in fact they are communicating through the communication channel that the attackers have established. The tag cloning, attackers make a duplicate RFID tag, which might either be quite similar in size or much larger than the original but have the same functionality.
引用
收藏
页码:70 / 77
页数:8
相关论文
共 22 条
[1]  
[Anonymous], BUILD LOW COST EXTEN
[2]  
[Anonymous], P WORKSH SEC PRIV TR
[3]   Auto-ID: Managing anything, anywhere, anytime in the supply chain [J].
Bose, I ;
Pal, R .
COMMUNICATIONS OF THE ACM, 2005, 48 (08) :100-106
[4]  
Garfinkel S., 2005, RFID APPL SECURITY P
[5]   RFID privacy: An overview of problems and proposed solutions [J].
Garfinkel, SL ;
Juels, A ;
Pappu, R .
IEEE SECURITY & PRIVACY, 2005, 3 (03) :34-43
[6]  
GRAASFATA A, 2006, RFID TOYS
[7]   The security implications of VeriChip cloning [J].
Halamka, John ;
Juels, Ari ;
Stubblefield, Adam ;
Westhues, Jonathan .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2006, 13 (06) :601-607
[8]  
HANCKE G, 2005, 14443 ISO U CAMBR CO
[9]   An RFID distance bounding protocol [J].
Hancke, GP ;
Kuhn, MG .
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, :67-73
[10]  
HANSCHE S, 2004, OFFICIAL GUIDE CISSP