Classifying RFID attacks and defenses

被引:134
作者
Mitrokotsa, Aikaterini [1 ]
Rieback, Melanie R. [2 ]
Tanenbaum, Andrew S. [2 ]
机构
[1] Delft Univ Technol, Fac Elect Engn Math & Comp Sci, Informat & Commun Theory Grp, NL-2628 CD Delft, Netherlands
[2] Vrije Univ Amsterdam, Dept Comp Sci, NL-1081 HV Amsterdam, Netherlands
关键词
RFID security; RFID attacks; Classification; PRIVACY;
D O I
10.1007/s10796-009-9210-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures. The goal of the paper is to categorize the existing weaknesses of RFID communication so that a better understanding of RFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
引用
收藏
页码:491 / 505
页数:15
相关论文
共 51 条
  • [1] [Anonymous], 1995, OFFICIAL J EUROPEAN, P31
  • [2] [Anonymous], 2003, THESIS MIT
  • [3] Avoine G, 2005, LECT NOTES COMPUT SC, V3570, P125
  • [4] Roadmap to solving security and privacy concerns in RFID systems
    University of the South Pacific, Fiji
    [J]. Comput Law Secur Rep, 2007, 6 (555-561):
  • [5] *CTR DEM TECHN, 2006, CDT WORK GR IN PRESS
  • [6] DESMEDT Y, 2006, P 6 WORLDW C COMP CO, P141
  • [7] Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications
    Devadas, Srinivas
    Suh, Edward
    Paral, Sid
    Sowell, Richard
    Ziola, Tom
    Khandelwal, Vivek
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, : 58 - +
  • [8] A lightweight RFID protocol to protect against traceability and cloning attacks
    Dimitriou, T
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 59 - 66
  • [9] *EDRI, 2006, CLON EL PASSP EDRI G
  • [10] *EMV, 2005, PROD