Research on security attack technology and detection method of RFID tag chip in intelligent electric meter
This paper introduces the security threats faced by RFID chips of intelligent electric meters firstly, and then focuses on the attack principle and security detection methods of Side-Channel Attack, which are elaborated from four aspects: non-contact RFID card test, fault-injection test, software an...
Saved in:
Published in | Journal of physics. Conference series Vol. 1750; no. 1; pp. 12071 - 12075 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
IOP Publishing
01.01.2021
|
Online Access | Get full text |
Cover
Loading…
Abstract | This paper introduces the security threats faced by RFID chips of intelligent electric meters firstly, and then focuses on the attack principle and security detection methods of Side-Channel Attack, which are elaborated from four aspects: non-contact RFID card test, fault-injection test, software and hardware cooperative detection and physical detection. |
---|---|
AbstractList | Abstract
This paper introduces the security threats faced by RFID chips of intelligent electric meters firstly, and then focuses on the attack principle and security detection methods of Side-Channel Attack, which are elaborated from four aspects: non-contact RFID card test, fault-injection test, software and hardware cooperative detection and physical detection. This paper introduces the security threats faced by RFID chips of intelligent electric meters firstly, and then focuses on the attack principle and security detection methods of Side-Channel Attack, which are elaborated from four aspects: non-contact RFID card test, fault-injection test, software and hardware cooperative detection and physical detection. |
Author | Zhen, Ke Hou, Xing Zhe Wang, Ling Yu He, Min Wang, Rui Gong, Qiujing |
Author_xml | – sequence: 1 givenname: Rui surname: Wang fullname: Wang, Rui email: wangrui8@cq.sgcc.com.cn organization: State Grid Chongqing Electric Power Company Marketing Service Center (Metrology Center) , China – sequence: 2 givenname: Qiujing surname: Gong fullname: Gong, Qiujing organization: State Grid Chongqing Electric Power Research Institute (Chongqing Key Laboratory of Energy Internet Advanced Metrology and Measurement Technology) , China – sequence: 3 givenname: Ke surname: Zhen fullname: Zhen, Ke organization: State Grid Chongqing Electric Power Company Marketing Service Center (Metrology Center) , China – sequence: 4 givenname: Xing Zhe surname: Hou fullname: Hou, Xing Zhe organization: State Grid Chongqing Electric Power Research Institute (Chongqing Key Laboratory of Energy Internet Advanced Metrology and Measurement Technology) , China – sequence: 5 givenname: Min surname: He fullname: He, Min organization: State Grid Chongqing Electric Power Company Marketing Service Center (Metrology Center) , China – sequence: 6 givenname: Ling Yu surname: Wang fullname: Wang, Ling Yu organization: State Grid Chongqing Electric Power Company Marketing Service Center (Metrology Center) , China |
BookMark | eNqFkE1LAzEQQINUsK3-BnMW1ib7vUeptlYKStVzSLKTbuo2WbLpof_eLJWCIBgGMsy8mYQ3QSNjDSB0S8k9JWU5o0UaR3lW5SHLyIzOCI1JQS_Q-NwZnfOyvEKTvt8RkoRTjNFuAz1wJxtsDe5BHpz2R8y95_ILe5CNsa3dhoqpcQ2h4HUA9-AbW2Or8GaxesSeb7FsdIe1CeGhbfUWjMfQBt5pOfDgrtGl4m0PNz_3FH0unj7mz9H6dbmaP6wjGac5jepKVSLjSZbIUmRpDBkURIpExFXKJVDBBS-pFEXNS5UKVYtc5JRkIlYihlQkU1Sc9kpn-96BYp3Te-6OjBI2KGODDDaIYYMyRtlJWZi8O01q27GdPTgT_sle3ubvv0HW1SrAyR_wf098A7AXf-Y |
ContentType | Journal Article |
Copyright | Published under licence by IOP Publishing Ltd |
Copyright_xml | – notice: Published under licence by IOP Publishing Ltd |
DBID | O3W TSCCA AAYXX CITATION |
DOI | 10.1088/1742-6596/1750/1/012071 |
DatabaseName | Open Access: IOP Publishing Free Content IOPscience (Open Access) CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: O3W name: Open Access: IOP Publishing Free Content url: http://iopscience.iop.org/ sourceTypes: Enrichment Source Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Physics |
DocumentTitleAlternate | Research on security attack technology and detection method of RFID tag chip in intelligent electric meter |
EISSN | 1742-6596 |
ExternalDocumentID | 10_1088_1742_6596_1750_1_012071 JPCS_1750_1_012071 |
GroupedDBID | 1JI 29L 2WC 4.4 5B3 5GY 5PX 5VS 7.Q AAJIO AAJKP ABHWH ACAFW ACHIP AEFHF AEJGL AFKRA AFYNE AIYBF AKPSB ALMA_UNASSIGNED_HOLDINGS ARAPS ASPBG ATQHT AVWKF AZFZN BENPR BGLVJ CCPQU CEBXE CJUJL CRLBU CS3 DU5 E3Z EBS EDWGO EQZZN F5P FRP GROUPED_DOAJ GX1 HCIFZ HH5 IJHAN IOP IZVLO J9A KNG KQ8 LAP N5L N9A O3W OK1 P2P PIMPY PJBAE RIN RNS RO9 ROL SY9 T37 TR2 TSCCA UCJ W28 XSB ~02 AAYXX CITATION |
ID | FETCH-LOGICAL-c2461-d9f9b5a353c8b542e5e70cb3b294ace1baba81cb7da8f4bfdb6b6105b2fb2e4b3 |
IEDL.DBID | O3W |
ISSN | 1742-6588 |
IngestDate | Fri Aug 23 03:59:21 EDT 2024 Fri Jan 22 06:57:35 EST 2021 Wed Aug 21 03:38:08 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2461-d9f9b5a353c8b542e5e70cb3b294ace1baba81cb7da8f4bfdb6b6105b2fb2e4b3 |
OpenAccessLink | https://iopscience.iop.org/article/10.1088/1742-6596/1750/1/012071 |
PageCount | 5 |
ParticipantIDs | crossref_primary_10_1088_1742_6596_1750_1_012071 iop_journals_10_1088_1742_6596_1750_1_012071 |
PublicationCentury | 2000 |
PublicationDate | 20210101 |
PublicationDateYYYYMMDD | 2021-01-01 |
PublicationDate_xml | – month: 01 year: 2021 text: 20210101 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Journal of physics. Conference series |
PublicationTitleAlternate | J. Phys.: Conf. Ser |
PublicationYear | 2021 |
Publisher | IOP Publishing |
Publisher_xml | – name: IOP Publishing |
References | Sun (JPCS_1750_1_012071bib4) 2012 Chang (JPCS_1750_1_012071bib3) Alavi (JPCS_1750_1_012071bib5) 2015 Hongzhuang (JPCS_1750_1_012071bib2) 2008; 24-6 Juels (JPCS_1750_1_012071bib1) 2005 |
References_xml | – volume: 24-6 start-page: 48 year: 2008 ident: JPCS_1750_1_012071bib2 publication-title: Security and privacy issues and policy analysis in RFID, Microcomputer information contributor: fullname: Hongzhuang – ident: JPCS_1750_1_012071bib3 contributor: fullname: Chang – year: 2012 ident: JPCS_1750_1_012071bib4 article-title: Research and implementation of side channel attack and defense[D] contributor: fullname: Sun – year: 2015 ident: JPCS_1750_1_012071bib5 contributor: fullname: Alavi – year: 2005 ident: JPCS_1750_1_012071bib1 contributor: fullname: Juels |
SSID | ssj0033337 |
Score | 2.2978015 |
Snippet | This paper introduces the security threats faced by RFID chips of intelligent electric meters firstly, and then focuses on the attack principle and security... Abstract This paper introduces the security threats faced by RFID chips of intelligent electric meters firstly, and then focuses on the attack principle and... |
SourceID | crossref iop |
SourceType | Aggregation Database Enrichment Source Publisher |
StartPage | 12071 |
Title | Research on security attack technology and detection method of RFID tag chip in intelligent electric meter |
URI | https://iopscience.iop.org/article/10.1088/1742-6596/1750/1/012071 |
Volume | 1750 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG4EYuLF-Iz4IE306Mq-uts9KkKAAxCUyK1pu62iyS6B9f873QeBgzHuqYfZpvm2237TfjOD0B0wVA08VVvCVtryw9CxgCXABwk8pSIiwffJs32Ogv7MH87JfDsWJl2WS_8DNItEwQWEpSCOtoFDu1ZAogBaxG47bRP_acLIG565NIM5PfbeqtXYgycsgiLNS5RWGq_fO9rZoWowiq0Np3eEDkumiB-LcR2jPZWcoP1csSnXp-iz0szhNMHrsgod5lnG5RfONgfmmCcxjlWWK64SXBSMxqnG097gGWf8HcuPxRIvErzYJOfMcFEcZyGNvVqdoVmv-9rpW2XhBEua9HBWHOlIEO4RT1JBfFcRFdpSeMKNfC6VI7jg1JEijDnVvtCxCATQKCJcLVzlC-8c1ZM0URcIK-A3tgZPNrap7-iIKnCpBAeWoXUYKt5EdgUWWxb5MVh-r00pM_gygy8z-DKHFfg20T2Aysp_Zf23-e2O-XDSedm1YMtYX_6v0yt04BpxSn6Wco3q2epb3QC7yEQLNZ66o8m0hWqD8aSVT6YfrDTEBw |
link.rule.ids | 315,783,787,27936,27937,38877,38902,53854,53880 |
linkProvider | IOP Publishing |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3JTsMwELVKEYgLYhVltQRHQrM5cY6oJWoLKhVQ0ZtlOzYEpLRqw_8zzlLRA0Lk5MPEsp4d-40z8wahK2CoGniqtoSttOWHoWMBS4AJCTylIiLB9ynUPodBb-wPJmTSQPEyF2Y6q7b-G2iWQsElhFVAHG0Dh3atgEQBtIjddtom_zN02rNEr6F1YtRNYF0_eq_1juzBE5aJkeZFSus4r987Wzml1mAkPw6deAdtV2wR35Zj20UNle2hjSJqUy720UcdN4enGV5Ulegwz3MuP3G-vDTHPEtwovIi6irDZdFoPNX4Ke53cc7fsHxPZzjNcLoU6MxxWSAnlcZezQ_QOL576fSsqniCJY1EnJVEOhKEe8STVBDfVUSFthSecCOfS-UILjh1pAgTTrUvdCICAVSKCFcLV_nCO0TNbJqpI4QVcBxbgzeb2NR3dEQVuFWCA9PQOgwVbyG7BovNSo0MVvzbppQZfJnBlxl8mcNKfFvoGkBl1fey-Nv8csV8MOo8r1owmP3j_3V6gTZH3Zg99If3J2jLNbEqxdXKKWrm8y91BmQjF-fFSvoGSyfFYQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+on+security+attack+technology+and+detection+method+of+RFID+tag+chip+in+intelligent+electric+meter&rft.jtitle=Journal+of+physics.+Conference+series&rft.au=Wang%2C+Rui&rft.au=Gong%2C+Qiujing&rft.au=Zhen%2C+Ke&rft.au=Hou%2C+Xing+Zhe&rft.date=2021-01-01&rft.issn=1742-6588&rft.eissn=1742-6596&rft.volume=1750&rft.issue=1&rft.spage=12071&rft_id=info:doi/10.1088%2F1742-6596%2F1750%2F1%2F012071&rft.externalDBID=n%2Fa&rft.externalDocID=10_1088_1742_6596_1750_1_012071 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1742-6588&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1742-6588&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1742-6588&client=summon |