Title :
An Empirical Study for Protecting Passive RFID Systems against Cloning
Author :
El-Said, Mostafa M. ; Woodring, Ira
Author_Institution :
Sch. of Comput. & Inf. Syst., Grand Valley State Univ., Allendale, MI
Abstract :
RFID technology plays a key role in various areas of interest without guaranteeing security and privacy issues. Limitations of tag design make privacy and security enforcement a special challenge. In this paper, we introduce the essential components of an RFID system. Subsequently the RFID tag-to-reader authentication is presented as a solution framework for the tag cloning problem. The proposed solution involves receiving EPC RFID Generation-2 standard response messages, which vary according to power level when sent a tag KILL command. Moreover, an empirical analysis is conducted to determine the necessary power level to kill the RFID tag for different brands and types. The intention of the conducted experiments is to determine the necessary power levels at which various RFID tags were able to be killed when preprogrammed with a specific KILL password. The authors found that results of power levels at which tags killed themselves varied widely.
Keywords :
radiofrequency identification; telecommunication security; transponders; RFID tag-to-reader authentication; passive RFID system protection; radiofrequency identification; tag cloning problem; transponder; Batteries; Cloning; Information security; Passive RFID tags; Privacy; Proposals; Protection; RFID tags; Radiofrequency identification; Transponders; EPC; RFID; RFID reader; RFID tag; eavesdropping; security; tag cloning; transponder;
Conference_Titel :
Information Technology: New Generations, 2009. ITNG '09. Sixth International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-3770-2
Electronic_ISBN :
978-0-7695-3596-8
DOI :
10.1109/ITNG.2009.272