RFID malware: Design principles and examples

نویسندگان

  • Melanie R. Rieback
  • Patrick N. D. Simpson
  • Bruno Crispo
  • Andrew S. Tanenbaum
چکیده

This paper explores the concept of malware for Radio Frequency Identification (RFID) systems — including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID virus. The various RFID malware approaches are then analyzed for their effectiveness across a range of target platforms. This paper concludes by warning RFID middleware developers to build appropriate checks into their RFID middleware before it achieves wide-scale deployment in the real world. c © 2006 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Analysis of RFID Protocol with Security, Trust and Privacy (STP)

RFID technology is becoming more pervasive and it is moving towards integration with other systems. The wireless communication between RFID reader and tags provides lots of benefits to users in business and as well as non-business area. However, unprotected data in the wireless communication channel of the RFID system introduced security risks. Even the integrity of the RFID reader could be com...

متن کامل

Design Guidelines for RFID-Based Applications in Manufacturing

The RFID technology opens new opportunities to monitor and control manufacturing processes. Therefore more and more manufacturers consider the introduction of RFID in their production lines. However, RFID projects face various challenges when designing the software infrastructure. In this paper we present design principles which guide application designers in developing and adapting RFID soluti...

متن کامل

Smart RFID Based Design for Inventory Management in Health Care

 Radio Frequency Identification (RFID) is used to identify the characteristics of an object wirelessly using radio waves. The purpose of this technology in this study is mainly focused on healthcare for inventory management and theft control replacing the manual logs. The storage and tracking of high-cost inventory items is developed. Automatic reordering and billing interfaces are designed for...

متن کامل

A secure ownership transfer protocol using EPCglobal Gen-2 RFID

Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be addressed. Due to the wireless transmission of the RFID system, malicious people can gain the information in the RFID tags, and the user’s privacy is invaded. Although there have been many...

متن کامل

Design of a Covert RFID Tag Network for Target Discovery and Target Information Routing

Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Pervasive and Mobile Computing

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2006