Tampering in RFID: A Survey on Risks and Defenses

نویسندگان

  • Filippo Gandino
  • Bartolomeo Montrucchio
  • Maurizio Rebaudengo
چکیده

RFID is a well-known pervasive technology, which provides promising opportunities for the implementation of new services and for the improvement of traditional ones. However, pervasive environments require strong efforts on all the aspects of information security. Notably, RFID passive tags are exposed to attacks, since strict limitations affect the security techniques for this technology. A critical threat for RFIDbased information systems is represented by data tampering, which corresponds to the malicious alteration of data recorded in the tag memory. The aim of this paper is to describe the characteristics and the effects of data tampering in RFID-based information systems, and to survey the approaches proposed by the research community to protect against it. The most important recent studies on privacy and security for RFID-based systems are examined, and the protection given against tampering is evaluated. This paper provides readers with an exhaustive overview on risks and defenses against data tampering, highlighting RFID weak spots and open issues.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Handling Security Threats to the RFID System of EPC Networks

1 Abstract: The use of radio frequency identification (RFID) technologies in all kinds of wireless network-based applications is becoming truly pervasive. Indeed, applications based on mobile wireless ad hoc networks (MANETs), wireless sensor networks (WSNs), and vehicular ad hoc networks (VANETs), among others, can highly benefit from the adoption of battery-less RFID solutions, such as electr...

متن کامل

Classifying RFID attacks and defenses

RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops a structural methodology for risks that RFI...

متن کامل

Probabilistic privacy leakage from Challenge-Response RFID authentication protocols

To assure the privacy of RFID Tags, symmetric challenge-response identification protocols have been considered. Due to the low cost requirements for tags, it has been assumed that the tampering of RFID tags is possible. In this paper, we estimate the privacy leakage of challenge-response RFID authentication protocols based on symmetric key using discrete probability under the assumption that ta...

متن کامل

An Improved Fragile Watermarking Method for Tamper Detection in RFID Tag

Tampering of RFID (Radio Frequency Identification) tag data results in misinterpretation of the object to which the tag is attached. Due to the advantages offered by RFID in the field of contactless auto identification, it is being used in the widespread range of applications. With growing adoption of RFID in industries, supply chain management, healthcare systems, security systems, government ...

متن کامل

Multi-Criteria Risk-Benefit Analysis of Health Care Management

Abstract Purpose of this paper: The objectives of this paper are two folds: (1) utilizing hierarchical fuzzy technique for order preference by similarity to ideal solution (TOPSIS) approach to evaluate the most suitable RFID-based systems decision, and (2) to highlight key risks and benefits of radio frequency identification technology in healthcare industry. Design/methodology/approach: R...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • MONET

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2010