Utilizing the RFID LOCK Command Against Multiple Targets
نویسندگان
چکیده
An unlocked Electronic Product Code (EPC) tag allows for issuance of most commands without the need for any authorization. This means that a system with unlocked tags would allow any attacker to modify tag data at will, whilst also opening the door to a range of other misuse. One possible avenue of active misuse against unlocked tags would be to issue LockID commands and ‘permanently’ lock some or all of a system‘s RFID tags. As this attack is simply an issuance of a valid command it fits firmly in the category of an active misuse and could also be considered a limited form of DoS as future valid commands would be ignored and limit or cripple the functionality of a system dependent on operation. This paper details an experiment using the LockID command to lock multiple tags within range.
منابع مشابه
Anti-collision Algorithm based on Multi-threaded RFID Lock Position
Combined with lock algorithm, retreat algorithm and multithreaded processing thoughts; it puts forward an anti-collision algorithm based on multi-threaded RFID lock position. RFID reader sends a quad command, RFID tag response the information of collision position, reduce the amount of data transmission; Fused with lock and multi-status thoughts, the algorithm checks the lock position of card n...
متن کاملMulti-Criteria Risk-Benefit Analysis of Health Care Management
Abstract Purpose of this paper: The objectives of this paper are two folds: (1) utilizing hierarchical fuzzy technique for order preference by similarity to ideal solution (TOPSIS) approach to evaluate the most suitable RFID-based systems decision, and (2) to highlight key risks and benefits of radio frequency identification technology in healthcare industry. Design/methodology/approach: R...
متن کاملGalloping and VIV control of square-section cylinder utilizing direct opposing smart control force
An adaptive fuzzy sliding mode controller (AFSMC) is adopted to reduce the 2D flow-induced vibration of an elastically supported square-section cylinder, free to oscillate in stream-wise andtransverse directions in both lock-in and galloping regions. The AFSMC strategy consists of a fuzzy logic inference system intended to follow a sliding-mode controller (SMC), and a robust control syste...
متن کاملRFID-based decision support within maintenance management of urban tunnel systems
Efficiently, tracking information related to components, materials and equipment from the production/construction phase to operation and maintenance is a challenge in the industries. The industry environment is a natural fit for generating and utilizing instance-level data for decision support. Advanced electronic identification and data storage technologies e.g. radio frequency identification ...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کامل