Attacking RFID Systems

A great number of hackers end up working in the security departments of IT and telecommunications companies. In other words, the best way of making a system secure is knowing how it can be attacked. Radio-frequency identification (RFID) is no different from any other technology, so the possible atta...

Full description

Saved in:
Bibliographic Details
Published inInformation Security Management Handbook, Volume 5 pp. 327 - 350
Format Book Chapter
LanguageEnglish
Published United Kingdom Auerbach Publications 2012
Auerbach Publishers, Incorporated
Subjects
Online AccessGet full text
ISBN9781439853450
1439853452
DOI10.1201/b11250-25

Cover

Abstract A great number of hackers end up working in the security departments of IT and telecommunications companies. In other words, the best way of making a system secure is knowing how it can be attacked. Radio-frequency identification (RFID) is no different from any other technology, so the possible attacks on it should be studied in depth. e extent of an attack can vary considerably; some attacks focus on a particular part of the system (e.g., the tag), whereas others target the whole system. Although there are references to such attacks in a number of publications, a rigorous study has not been made of the subject until now. We examine, in this chapter, the main threats to RFID security. First, we look at data and location privacy. Although these are the risks most often referred to in the literature, there are other equally important problems to consider too. RFID systems are made up of three main components (tag, reader, and back-end database), so we have grouped the threats according to the unit involved in the attack. First, we examine those related to tags and readers such as eavesdropping, cloning, replay, and relay attacks. en we look at the threats to the back-end database (e.g., object name service [ONS] attack, virus). By the end of this chapter (and with the opportunity to consult the extensive bibliography for further details), we hope the reader will have acquired a basic understanding of the principal security risks in RFID.
AbstractList A great number of hackers end up working in the security departments of IT and telecommunications companies. In other words, the best way of making a system secure is knowing how it can be attacked. Radio-frequency identification (RFID) is no different from any other technology, so the possible attacks on it should be studied in depth. e extent of an attack can vary considerably; some attacks focus on a particular part of the system (e.g., the tag), whereas others target the whole system. Although there are references to such attacks in a number of publications, a rigorous study has not been made of the subject until now. We examine, in this chapter, the main threats to RFID security. First, we look at data and location privacy. Although these are the risks most often referred to in the literature, there are other equally important problems to consider too. RFID systems are made up of three main components (tag, reader, and back-end database), so we have grouped the threats according to the unit involved in the attack. First, we examine those related to tags and readers such as eavesdropping, cloning, replay, and relay attacks. en we look at the threats to the back-end database (e.g., object name service [ONS] attack, virus). By the end of this chapter (and with the opportunity to consult the extensive bibliography for further details), we hope the reader will have acquired a basic understanding of the principal security risks in RFID.
BookMark eNotkFtLAzEQhSNesNY--OJz_8BqMrk_lmpVKAhenkN2N9G126QmUem_d2sdDgwDcz4O5wwdhRgcQhcEXxHA5LomBDiugB-giZYKM9AESw3s8O8mjGrFKeP4BI2k4hIkVXCKJjl_4GH47oOP0OWsFNusuvA2fVo83Eyft7m4dT5Hx9722U3-9xi9Lm5f5vfV8vHuYT5bVh3BRFUcuMeSYq1bzqUQbV0LR7ynzgMTrvF6kJDcCkytJ9qx1jOrhuwOasskHSPYczcpfn65XIyrY1w1LpRk--bdbopL2SiMNXADwlBQg2m2N3XBx7S2PzH1rSl228fkkw1Nl3eQbAg2u67MviszEL4HWhcD0F8_TFy7
ContentType Book Chapter
Copyright 2012 by Taylor & Francis Group, LLC
Copyright_xml – notice: 2012 by Taylor & Francis Group, LLC
DBID FFUUA
DEWEY 005.8
DOI 10.1201/b11250-25
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9780429107924
0429107927
9781439853467
1439853460
Editor Krause Nozaki, Micki
Tipton, Harold F
Editor_xml – sequence: 1
  fullname: Krause Nozaki, Micki
– sequence: 2
  fullname: Tipton, Harold F
EndPage 350
ExternalDocumentID EBC800925_26_328
10_1201_b11250_25_version2
GroupedDBID 089
20A
38.
5~G
A4J
AABBV
AALIM
AAXNY
ABARN
ABQPQ
ACBYE
ACDAZ
ACLGV
ACNAM
ADVEM
ADYHE
AEGEX
AERYV
AEUHU
AFIZQ
AFOJC
AHWGJ
AIXXW
AJC
AJFER
AJS
AKSCQ
ALMA_UNASSIGNED_HOLDINGS
ATPON
AWD
AZZ
BBABE
BPBUR
CZZ
EBATF
GEOUK
I4C
INALI
JG1
JTX
MX7
MYL
NEQ
OHILO
OODEK
PQQKQ
FFUUA
ID FETCH-LOGICAL-i1018-525f073099d55766dbb6e1ff3ef246ecf9cf9675a603af19e4df4a8b11e2ba473
ISBN 9781439853450
1439853452
IngestDate Mon Jun 16 01:55:04 EDT 2025
Mon Apr 21 06:25:36 EDT 2025
IsPeerReviewed false
IsScholarly false
Keywords Entity Authentication
Common Gateway Interface
EPC Network
FIPS
Visa Waiver Program
Lf Tag
AIDS
RFID
Low Cost RFID Tag
EPC Information Service
Relay Attacks
RFID Reader
RFID System
NA TA
RFID Technology
Sensitive Information
Unique Identifier
RFID Context
Active Jamming
Power Consumption
RFID Tag
Inductive Coupling
Back End Database
EPC Class
LCCallNum QA76.9.A25
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-i1018-525f073099d55766dbb6e1ff3ef246ecf9cf9675a603af19e4df4a8b11e2ba473
OCLC 785727382
PQID EBC800925_26_328
PageCount 24
ParticipantIDs proquest_ebookcentralchapters_800925_26_328
informaworld_taylorfrancisbooks_10_1201_b11250_25_version2
PublicationCentury 2000
PublicationDate 2012
2011
PublicationDateYYYYMMDD 2012-01-01
2011-01-01
PublicationDate_xml – year: 2012
  text: 2012
PublicationDecade 2010
PublicationPlace United Kingdom
PublicationPlace_xml – name: United Kingdom
PublicationTitle Information Security Management Handbook, Volume 5
PublicationYear 2012
2011
Publisher Auerbach Publications
Auerbach Publishers, Incorporated
Publisher_xml – name: Auerbach Publications
– name: Auerbach Publishers, Incorporated
SSID ssj0000581435
ssib056453579
Score 1.3518685
Snippet A great number of hackers end up working in the security departments of IT and telecommunications companies. In other words, the best way of making a system...
SourceID proquest
informaworld
SourceType Publisher
StartPage 327
SubjectTerms Computer security
Network management
Security services
Title Attacking RFID Systems
URI https://www.taylorfrancis.com/books/9780429107924/chapters/10.1201/b11250-25
http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=800925&ppg=328&c=UERG
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JS8NAFB6kvYgH12LdyMFbiaazmfEm2lI9eGqhtyEzmQERKtjUg7_eN0vTxXpQIYQQssy8N3lb3vseQpeCay64zVPXEjOlJufwSVmRMqMx1TkHK9onyD7zwYg-jdl4gXvrq0sqdaU_N9aV_IWrcA746qpkf8HZ-qFwAo6Bv7AHDsN-zfhdDbPGdMG68DBGzcGeXmSzdAbFpHS3-UxWL4M6bHmB3FVVoV999l3_8WEFujxGAXw6xUpGxQyY4AqwNgT7gqsIdpEA1UxD84sorkioy4-ajwQI2G9CFXswfwWWGcvSUKa8hlHtPAm4SoZrJGbyI0T7QDk2MeUka6Am6NleHUlxIDZk_ocw4LC7IbII_gQPu65fuIYi-01relNguId2XHlI4uo2YGz7aMtMDtDuvDlGEmXlIWrV9E0cfZNI3yM06veG94M0NqFIXxyYGTjqzDoxKETJwDfjpVLcdK0lxsLEjLYCNvC6Cp6RwnaFoaWlRQ6DN1gV9Ia0UGPyNjHHKFEWG5wZpljhpooVMWA_8xwbk1nMdBvdLs9TVj5mY0ODFbdgpvJnQrdRZ04V6f-zx-ReHcgxlbmD12ISc0lwfvKfV52i7cUSPEON6n1mzsE0q9RF5PIXXGo6sQ
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Information+Security+Management+Handbook%2C+Volume+5&rft.atitle=Attacking+RFID+Systems&rft.date=2012-01-01&rft.pub=Auerbach+Publications&rft.isbn=9781439853467&rft.spage=327&rft.epage=350&rft_id=info:doi/10.1201%2Fb11250-25&rft.externalDocID=10_1201_b11250_25_version2
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F800925-l.jpg