An Enumeration of RFID Related Threats

  • Authors:
  • Thomas Schaberreiter;Christian Wieser;Iván Sánchez;Jukka Riekki;Juha Röning

  • Affiliations:
  • -;-;-;-;-

  • Venue:
  • UBICOMM '08 Proceedings of the 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present a holistic view on RFID security using logical entities that most RFID applications will use. Starting from an abstract model of anRFID-System we propose a generalized threat model for RFID-Systems based on the classical terms of information security: Confidentiality, Availability and Integrity. We use the method of attack trees for a listing of threats that apply to RFID-Systems. The key benefitis that this threat model enables a systematic analysis of a specific RFID-System's security and it allows to compare the security of RFID-Systems. By analyzing this threat listing we show that all parts of an RFID Systemare vulnerable to attacks and a single weakpoint in the system can breach information security.