DocumentCode :
3121473
Title :
How RFID Attacks Are Expressed in Output Data
Author :
Mirowski, Luke ; Hartnett, Jacqueline ; Williams, Raymond
Author_Institution :
Sch. of Comput. & Inf. Syst., Univ. of Tasmania, Hobart, TAS, Australia
fYear :
2009
fDate :
14-16 Dec. 2009
Firstpage :
794
Lastpage :
799
Abstract :
Attacks at the ¿RFID layer¿, where tags and readers interact, appear in the output data used by the ¿strategic layer¿ to monitor or authorize entities. Previous research has used contextual information from the ¿real world layer¿ or ¿strategic layer¿ for attack detection purposes; this means that detection methods need to be customized to the application environment. In contrast, we introduce the concept of an ¿RFID layer context model¿ to contextualize output data at the RFID layer. The improvement is that context at this layer is divorced from the application environment, and thus, attack detection does not need to be customized to the application. As the features we use are generic, this work takes the first steps towards automating the detection of attacks at the RFID layer.
Keywords :
radiofrequency identification; telecommunication security; RFID attack; RFID layer context model; RFID reader; RFID tag; attack detection; security; strategic layer; Cloning; Computer networks; Context modeling; Data security; Databases; Drugs; Human immunodeficiency virus; Monitoring; Pervasive computing; Radiofrequency identification; Attacks; Detection; RFID; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Systems, Algorithms, and Networks (ISPAN), 2009 10th International Symposium on
Conference_Location :
Kaohsiung
Print_ISBN :
978-1-4244-5403-7
Type :
conf
DOI :
10.1109/I-SPAN.2009.99
Filename :
5381743
Link To Document :
بازگشت