DocumentCode :
3589909
Title :
RFID system security assessment methodology based on attack graph model
Author :
Xiaoming Yang ; Jiahao Wang ; Yifu Huang ; Zhiguang Qin
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
fYear :
2014
Firstpage :
1161
Lastpage :
1166
Abstract :
In order to effectively evaluate the security level of an applicable RFID system, researchers usually need to carry out a series of penetration test from the view of attackers. According to the extent of the attacker´s effort, security level of the RFID system can be assessed by both qualitative and quantitative method. A new attack graph mechanism based on the characteristics of the RFID offensive and defensive attack strategy is proposed by analyzing the activities of existing RFID attacks. By analyzing the attack characteristics of different RFID systems, the proposed graph model can automatically evaluate the attack vulnerabilitie and dynamically predict the trend of attack effect in RFID system. By analyzing the attack instances on RFID UHF EPC C1 Gen2 protocol, the validity of the attack graph model is verified.
Keywords :
cryptographic protocols; graph theory; radiofrequency identification; RFID UHF EPC C1 gen2 protocol; RFID defensive attack strategy characteristics; RFID offensive attack strategy characteristics; RFID system security assessment methodology; attack graph model mechanism; authentication protocols; qualitative method; quantitative method; vulnerability evaluation; Analytical models; Authentication; Communication networks; Computer science; Protocols; Radiofrequency identification; RFID attacks library; atomic attack; attack graph model;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reliability, Maintainability and Safety (ICRMS), 2014 International Conference on
Print_ISBN :
978-1-4799-6631-8
Type :
conf
DOI :
10.1109/ICRMS.2014.7107386
Filename :
7107386
Link To Document :
بازگشت