Attacking RFID Systems
A great number of hackers end up working in the security departments of IT and telecommunications companies. In other words, the best way of making a system secure is knowing how it can be attacked. Radio-frequency identification (RFID) is no different from any other technology, so the possible atta...
Saved in:
Published in | Information Security Management Handbook, Volume 5 pp. 327 - 350 |
---|---|
Format | Book Chapter |
Language | English |
Published |
United Kingdom
Auerbach Publications
2012
Auerbach Publishers, Incorporated |
Subjects | |
Online Access | Get full text |
ISBN | 9781439853450 1439853452 |
DOI | 10.1201/b11250-25 |
Cover
Abstract | A great number of hackers end up working in the security departments of IT and telecommunications companies. In other words, the best way of making a system secure is knowing how it can
be attacked. Radio-frequency identification (RFID) is no different from any other technology, so
the possible attacks on it should be studied in depth. e extent of an attack can vary considerably; some attacks focus on a particular part of the system (e.g., the tag), whereas others target
the whole system. Although there are references to such attacks in a number of publications, a
rigorous study has not been made of the subject until now. We examine, in this chapter, the main
threats to RFID security. First, we look at data and location privacy. Although these are the risks
most often referred to in the literature, there are other equally important problems to consider
too. RFID systems are made up of three main components (tag, reader, and back-end database),
so we have grouped the threats according to the unit involved in the attack. First, we examine
those related to tags and readers such as eavesdropping, cloning, replay, and relay attacks. en
we look at the threats to the back-end database (e.g., object name service [ONS] attack, virus).
By the end of this chapter (and with the opportunity to consult the extensive bibliography for
further details), we hope the reader will have acquired a basic understanding of the principal
security risks in RFID. |
---|---|
AbstractList | A great number of hackers end up working in the security departments of IT and telecommunications companies. In other words, the best way of making a system secure is knowing how it can
be attacked. Radio-frequency identification (RFID) is no different from any other technology, so
the possible attacks on it should be studied in depth. e extent of an attack can vary considerably; some attacks focus on a particular part of the system (e.g., the tag), whereas others target
the whole system. Although there are references to such attacks in a number of publications, a
rigorous study has not been made of the subject until now. We examine, in this chapter, the main
threats to RFID security. First, we look at data and location privacy. Although these are the risks
most often referred to in the literature, there are other equally important problems to consider
too. RFID systems are made up of three main components (tag, reader, and back-end database),
so we have grouped the threats according to the unit involved in the attack. First, we examine
those related to tags and readers such as eavesdropping, cloning, replay, and relay attacks. en
we look at the threats to the back-end database (e.g., object name service [ONS] attack, virus).
By the end of this chapter (and with the opportunity to consult the extensive bibliography for
further details), we hope the reader will have acquired a basic understanding of the principal
security risks in RFID. |
BookMark | eNotkFtLAzEQhSNesNY--OJz_8BqMrk_lmpVKAhenkN2N9G126QmUem_d2sdDgwDcz4O5wwdhRgcQhcEXxHA5LomBDiugB-giZYKM9AESw3s8O8mjGrFKeP4BI2k4hIkVXCKJjl_4GH47oOP0OWsFNusuvA2fVo83Eyft7m4dT5Hx9722U3-9xi9Lm5f5vfV8vHuYT5bVh3BRFUcuMeSYq1bzqUQbV0LR7ynzgMTrvF6kJDcCkytJ9qx1jOrhuwOasskHSPYczcpfn65XIyrY1w1LpRk--bdbopL2SiMNXADwlBQg2m2N3XBx7S2PzH1rSl228fkkw1Nl3eQbAg2u67MviszEL4HWhcD0F8_TFy7 |
ContentType | Book Chapter |
Copyright | 2012 by Taylor & Francis Group, LLC |
Copyright_xml | – notice: 2012 by Taylor & Francis Group, LLC |
DBID | FFUUA |
DEWEY | 005.8 |
DOI | 10.1201/b11250-25 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9780429107924 0429107927 9781439853467 1439853460 |
Editor | Krause Nozaki, Micki Tipton, Harold F |
Editor_xml | – sequence: 1 fullname: Krause Nozaki, Micki – sequence: 2 fullname: Tipton, Harold F |
EndPage | 350 |
ExternalDocumentID | EBC800925_26_328 10_1201_b11250_25_version2 |
GroupedDBID | 089 20A 38. 5~G A4J AABBV AALIM AAXNY ABARN ABQPQ ACBYE ACDAZ ACLGV ACNAM ADVEM ADYHE AEGEX AERYV AEUHU AFIZQ AFOJC AHWGJ AIXXW AJC AJFER AJS AKSCQ ALMA_UNASSIGNED_HOLDINGS ATPON AWD AZZ BBABE BPBUR CZZ EBATF GEOUK I4C INALI JG1 JTX MX7 MYL NEQ OHILO OODEK PQQKQ FFUUA |
ID | FETCH-LOGICAL-i1018-525f073099d55766dbb6e1ff3ef246ecf9cf9675a603af19e4df4a8b11e2ba473 |
ISBN | 9781439853450 1439853452 |
IngestDate | Mon Jun 16 01:55:04 EDT 2025 Mon Apr 21 06:25:36 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Keywords | Entity Authentication Common Gateway Interface EPC Network FIPS Visa Waiver Program Lf Tag AIDS RFID Low Cost RFID Tag EPC Information Service Relay Attacks RFID Reader RFID System NA TA RFID Technology Sensitive Information Unique Identifier RFID Context Active Jamming Power Consumption RFID Tag Inductive Coupling Back End Database EPC Class |
LCCallNum | QA76.9.A25 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-i1018-525f073099d55766dbb6e1ff3ef246ecf9cf9675a603af19e4df4a8b11e2ba473 |
OCLC | 785727382 |
PQID | EBC800925_26_328 |
PageCount | 24 |
ParticipantIDs | proquest_ebookcentralchapters_800925_26_328 informaworld_taylorfrancisbooks_10_1201_b11250_25_version2 |
PublicationCentury | 2000 |
PublicationDate | 2012 2011 |
PublicationDateYYYYMMDD | 2012-01-01 2011-01-01 |
PublicationDate_xml | – year: 2012 text: 2012 |
PublicationDecade | 2010 |
PublicationPlace | United Kingdom |
PublicationPlace_xml | – name: United Kingdom |
PublicationTitle | Information Security Management Handbook, Volume 5 |
PublicationYear | 2012 2011 |
Publisher | Auerbach Publications Auerbach Publishers, Incorporated |
Publisher_xml | – name: Auerbach Publications – name: Auerbach Publishers, Incorporated |
SSID | ssj0000581435 ssib056453579 |
Score | 1.3518685 |
Snippet | A great number of hackers end up working in the security departments of IT and telecommunications companies. In other words, the best way of making a system... |
SourceID | proquest informaworld |
SourceType | Publisher |
StartPage | 327 |
SubjectTerms | Computer security Network management Security services |
Title | Attacking RFID Systems |
URI | https://www.taylorfrancis.com/books/9780429107924/chapters/10.1201/b11250-25 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=800925&ppg=328&c=UERG |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JS8NAFB6kvYgH12LdyMFbiaazmfEm2lI9eGqhtyEzmQERKtjUg7_eN0vTxXpQIYQQssy8N3lb3vseQpeCay64zVPXEjOlJufwSVmRMqMx1TkHK9onyD7zwYg-jdl4gXvrq0sqdaU_N9aV_IWrcA746qpkf8HZ-qFwAo6Bv7AHDsN-zfhdDbPGdMG68DBGzcGeXmSzdAbFpHS3-UxWL4M6bHmB3FVVoV999l3_8WEFujxGAXw6xUpGxQyY4AqwNgT7gqsIdpEA1UxD84sorkioy4-ajwQI2G9CFXswfwWWGcvSUKa8hlHtPAm4SoZrJGbyI0T7QDk2MeUka6Am6NleHUlxIDZk_ocw4LC7IbII_gQPu65fuIYi-01relNguId2XHlI4uo2YGz7aMtMDtDuvDlGEmXlIWrV9E0cfZNI3yM06veG94M0NqFIXxyYGTjqzDoxKETJwDfjpVLcdK0lxsLEjLYCNvC6Cp6RwnaFoaWlRQ6DN1gV9Ia0UGPyNjHHKFEWG5wZpljhpooVMWA_8xwbk1nMdBvdLs9TVj5mY0ODFbdgpvJnQrdRZ04V6f-zx-ReHcgxlbmD12ISc0lwfvKfV52i7cUSPEON6n1mzsE0q9RF5PIXXGo6sQ |
linkProvider | ProQuest Ebooks |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Information+Security+Management+Handbook%2C+Volume+5&rft.atitle=Attacking+RFID+Systems&rft.date=2012-01-01&rft.pub=Auerbach+Publications&rft.isbn=9781439853467&rft.spage=327&rft.epage=350&rft_id=info:doi/10.1201%2Fb11250-25&rft.externalDocID=10_1201_b11250_25_version2 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F800925-l.jpg |