Title :
How RFID Attacks Are Expressed in Output Data
Author :
Mirowski, Luke ; Hartnett, Jacqueline ; Williams, Raymond
Author_Institution :
Sch. of Comput. & Inf. Syst., Univ. of Tasmania, Hobart, TAS, Australia
Abstract :
Attacks at the ¿RFID layer¿, where tags and readers interact, appear in the output data used by the ¿strategic layer¿ to monitor or authorize entities. Previous research has used contextual information from the ¿real world layer¿ or ¿strategic layer¿ for attack detection purposes; this means that detection methods need to be customized to the application environment. In contrast, we introduce the concept of an ¿RFID layer context model¿ to contextualize output data at the RFID layer. The improvement is that context at this layer is divorced from the application environment, and thus, attack detection does not need to be customized to the application. As the features we use are generic, this work takes the first steps towards automating the detection of attacks at the RFID layer.
Keywords :
radiofrequency identification; telecommunication security; RFID attack; RFID layer context model; RFID reader; RFID tag; attack detection; security; strategic layer; Cloning; Computer networks; Context modeling; Data security; Databases; Drugs; Human immunodeficiency virus; Monitoring; Pervasive computing; Radiofrequency identification; Attacks; Detection; RFID; Security;
Conference_Titel :
Pervasive Systems, Algorithms, and Networks (ISPAN), 2009 10th International Symposium on
Conference_Location :
Kaohsiung
Print_ISBN :
978-1-4244-5403-7
DOI :
10.1109/I-SPAN.2009.99