• DocumentCode
    1757548
  • Title

    Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks

  • Author

    Halevi, Tzipora ; Haoyu Li ; Di Ma ; Saxena, Navrati ; Voris, Jonathan ; Tuo Xiang

  • Author_Institution
    Polytech. Inst., New York Univ., New York, NY, USA
  • Volume
    1
  • Issue
    2
  • fYear
    2013
  • fDate
    Dec. 2013
  • Firstpage
    307
  • Lastpage
    318
  • Abstract
    Many RFID tags store valuable information privy to their users that can easily be subject to unauthorized reading, leading to owner tracking, or impersonation. RFID tags are also susceptible to different forms of relay attacks. This paper presents novel sensing-enabled defenses to unauthorized reading and relay attacks against RFID systems without necessitating any changes to the traditional RFID usage model. Specifically, this paper proposes the use of cyber-physical interfaces, on-board tag sensors, to (automatically) acquire useful contextual information about the tag´s environment (or its owner, or the tag itself). First, such context recognition is leveraged for the purpose of selective tag unlocking-the tag will respond selectively to reader interrogations. In particular, novel mechanisms based on an owner´s posture recognition are presented. Second, context recognition is used as a basis for transaction verification in order to provide protection against a severe form of relay attacks involving malicious RFID readers. A new mechanism is developed that can determine the proximity between a valid tag and a valid reader by correlating certain (specifically audio) sensor data extracted from the two devices. Our evaluation of the proposed mechanisms demonstrate their feasibility in significantly raising the bar against RFID attacks.
  • Keywords
    radiofrequency identification; relay networks (telecommunication); RFID tags; RFID unauthorized reading; context recognition; cyber-physical interfaces; malicious RFID readers; novel sensing-enabled defenses; on-board tag sensors; posture recognition; relay attacks; selective tag unlocking; transaction verification; valid reader; valid tag; Accelerometers; Authentication; Authorization; Computer security; Context awareness; Magnetometers; Privacy; Radiofrequency identification; Tagging; RFID; context recognition; relay attacks; sensors;
  • fLanguage
    English
  • Journal_Title
    Emerging Topics in Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    2168-6750
  • Type

    jour

  • DOI
    10.1109/TETC.2013.2290537
  • Filename
    6663617