Utilizing the RFID LOCK Command Against Multiple Targets

نویسندگان

  • Christopher Bolan
  • Edith Cowan
  • C. Bolan
چکیده

An unlocked Electronic Product Code (EPC) tag allows for issuance of most commands without the need for any authorization. This means that a system with unlocked tags would allow any attacker to modify tag data at will, whilst also opening the door to a range of other misuse. One possible avenue of active misuse against unlocked tags would be to issue LockID commands and ‘permanently’ lock some or all of a system‘s RFID tags. As this attack is simply an issuance of a valid command it fits firmly in the category of an active misuse and could also be considered a limited form of DoS as future valid commands would be ignored and limit or cripple the functionality of a system dependent on operation. This paper details an experiment using the LockID command to lock multiple tags within range.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anti-collision Algorithm based on Multi-threaded RFID Lock Position

Combined with lock algorithm, retreat algorithm and multithreaded processing thoughts; it puts forward an anti-collision algorithm based on multi-threaded RFID lock position. RFID reader sends a quad command, RFID tag response the information of collision position, reduce the amount of data transmission; Fused with lock and multi-status thoughts, the algorithm checks the lock position of card n...

متن کامل

Multi-Criteria Risk-Benefit Analysis of Health Care Management

Abstract Purpose of this paper: The objectives of this paper are two folds: (1) utilizing hierarchical fuzzy technique for order preference by similarity to ideal solution (TOPSIS) approach to evaluate the most suitable RFID-based systems decision, and (2) to highlight key risks and benefits of radio frequency identification technology in healthcare industry. Design/methodology/approach: R...

متن کامل

Galloping and VIV control of square-section cylinder utilizing direct opposing smart control force

An adaptive fuzzy sliding mode controller (AFSMC) is adopted to reduce the 2D flow-induced vibration of an elastically supported square-section cylinder, free to oscillate in stream-wise andtransverse directions in both lock-in and galloping regions. The AFSMC strategy consists of a fuzzy logic inference system intended to follow a sliding-mode controller (SMC), and a robust control syste...

متن کامل

RFID-based decision support within maintenance management of urban tunnel systems

Efficiently, tracking information related to components, materials and equipment from the production/construction phase to operation and maintenance is a challenge in the industries. The industry environment is a natural fit for generating and utilizing instance-level data for decision support. Advanced electronic identification and data storage technologies e.g. radio frequency identification ...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017