An RFID Attacker Behavior Taxonomy

  • Authors:
  • Luke Mirowski;Jacqueline Hartnett;Raymond Williams

  • Affiliations:
  • University of Tasmania;University of Tasmania;University of Tasmania

  • Venue:
  • IEEE Pervasive Computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Radio frequency identification (RFID) uses electronic tags to produce information about entities in the real world. Security is important when the information is used to make decisions about high-value entities such as pharmaceuticals. The authors present a taxonomy of attacker behavior to show how attacks can be sequenced to invalidate the informational goals of RFID systems. The taxonomy can be used to understand the security requirements of RFID systems.