A framework for assessing RFID system security and privacy risks

被引:48
作者
Rotter, Pawel [1 ]
机构
[1] Joint Res Ctr European Commission Seville, Inst Prospect Technol Studies, Seville, Spain
关键词
Privacy; RFID; Security;
D O I
10.1109/MPRV.2008.22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Radio Frequency Identification systems (RFID) is a powerful technology with numerous application possibilities, but it is also a technology that raises serious privacy and security risks. RFID-based systems are subject to generic attack that threaten system security and user privacy, like all information systems and there are also many attacks that specifically target RFID system technologies. The countermeasures are to encrypt the data and to use a metal screen to shield the tag and reader during information exchange. The communication looks as if the legitimate tag and the reader are close to each other, when in fact they are communicating through the communication channel that the attackers have established. The tag cloning, attackers make a duplicate RFID tag, which might either be quite similar in size or much larger than the original but have the same functionality.
引用
收藏
页码:70 / 77
页数:8
相关论文
共 22 条
[11]  
Hoepman JH, 2006, LECT NOTES COMPUT SC, V4266, P152
[12]   Security and privacy issues in e-passports [J].
Juels, A ;
Molnar, D ;
Wagner, D .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :74-85
[13]  
Juels A., 2003, Proc. ACM Conf. Computer and Communications Security, P103, DOI DOI 10.1145/948109.948126
[14]  
KARJOTH G, 2005, P 2005 ACM WORKSH PR, P27, DOI DOI 10.1145/1102199.1102205
[15]   Picking virtual pockets using relay attacks on contactless smartcard systems [J].
Kfir, Z ;
Wool, A .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :47-58
[16]  
MAGHIROS I, 2007, 22770 EN I PROSP TEC
[17]   RFID technology and applications [J].
Nath, B ;
Reynolds, F ;
Want, R .
IEEE PERVASIVE COMPUTING, 2006, 5 (01) :22-24
[18]  
Rieback MR, 2006, PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, P169
[19]  
Rieback MR, 2005, LECT NOTES COMPUT SC, V3574, P184
[20]   RFID implants: Opportunities and challenges for identifying people [J].
Rotter, Pawel ;
Daskala, Barbara ;
Compano, Ramon .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2008, 27 (02) :24-32