Triggering Hardware Trojans in EPC C1G2 RFID Tags
نویسندگان
چکیده
This paper addresses the Hardware Trojan issues in passive EPC C1G2 RFID Tags. We propose in this paper to study the insertion of malicious circuit in EPC GEN2 RFID tags. The description and the implementation of several different Hardware Trojans are first discussed. Then they are all evaluated in an EPC GEN2 environment using a dedicated FPGA based tag emulator. The evaluation focuses on criteria such as Trojan detection, design cost and EPC gen2 compliance. Keywords-component; Hardware Trojan, RFID security.
منابع مشابه
Design Considerations for the Digital Core of a C1G2 RFID Tag
An EPC Class 1 Gen 2 (C1G2) RFID system is composed of a reader and one or several passive tags. Passive tags obtain the required energy from the radio frequency field emitted by the reader. The forward data link (reader to tag) is embedded in this radio frequency field. The backward data link (tag to reader) is achieved by means of backscattering. The RFID tag consists of several analog circui...
متن کاملOn the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?
In this work, we demonstrate the practicality of people tracking by means of physical-layer fingerprints of RFID tags that they carry. We build a portable low-cost USRP-based RFID fingerprinter and we show, over a set of 210 EPC C1G2 tags, that this fingerprinter enables reliable identification of individual tags from varying distances and across different tag placements (wallet, shopping bag, ...
متن کاملToken-MAC: Inactive RFID Systems for A light MAC Protocol
Passive RFID systems used for list organization and benefit tracking normally use contention-based MAC protocols, such as the normal C1G2 protocol. Although the C1G2 protocol has the benefit that it is easy to apply, it suffers from wrongness and relatively low throughput when the number of tags in the network increases. It proposes a token-based MAC protocol called Token-MAC for passive RFID s...
متن کاملAn Ultra-lightweight RFID Seeking Protocol for Low-cost Tags
RFID systems are widely used in various applications, and attaching RFID tags to objects are increasing. Recently, Xie et al. defined RFID seeking concept which is finding a lost tag in a blind spot or a specified tag among lots of similar ones and proposed a lightweight RFID seeking protocol. Their protocol provides security and privacy against most of common malicious attacks. However, since ...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کامل