DocumentCode
3589909
Title
RFID system security assessment methodology based on attack graph model
Author
Xiaoming Yang ; Jiahao Wang ; Yifu Huang ; Zhiguang Qin
Author_Institution
Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
fYear
2014
Firstpage
1161
Lastpage
1166
Abstract
In order to effectively evaluate the security level of an applicable RFID system, researchers usually need to carry out a series of penetration test from the view of attackers. According to the extent of the attacker´s effort, security level of the RFID system can be assessed by both qualitative and quantitative method. A new attack graph mechanism based on the characteristics of the RFID offensive and defensive attack strategy is proposed by analyzing the activities of existing RFID attacks. By analyzing the attack characteristics of different RFID systems, the proposed graph model can automatically evaluate the attack vulnerabilitie and dynamically predict the trend of attack effect in RFID system. By analyzing the attack instances on RFID UHF EPC C1 Gen2 protocol, the validity of the attack graph model is verified.
Keywords
cryptographic protocols; graph theory; radiofrequency identification; RFID UHF EPC C1 gen2 protocol; RFID defensive attack strategy characteristics; RFID offensive attack strategy characteristics; RFID system security assessment methodology; attack graph model mechanism; authentication protocols; qualitative method; quantitative method; vulnerability evaluation; Analytical models; Authentication; Communication networks; Computer science; Protocols; Radiofrequency identification; RFID attacks library; atomic attack; attack graph model;
fLanguage
English
Publisher
ieee
Conference_Titel
Reliability, Maintainability and Safety (ICRMS), 2014 International Conference on
Print_ISBN
978-1-4799-6631-8
Type
conf
DOI
10.1109/ICRMS.2014.7107386
Filename
7107386
Link To Document