Is Your Cat Infected with a Computer Virus?
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Dependability through Assured Reconfiguration in Embedded System Software
IEEE Transactions on Dependable and Secure Computing
Protocols for RFID tag/reader authentication
Decision Support Systems
Defining Strong Privacy for RFID
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Parallel and concurrent security of the HB and HB+ protocols
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Hi-index | 0.00 |
In this paper, we present an RFID survivability experiment and quantitatively measure the degree of survivability of an RFID system under varying attacks. By modeling different malicious scenarios using stochastic process algebras, we show the different effects of those attacks on an RFID system's ability to provide critical services even when some components have been damaged. Our model relates its statistic to the attack strategies and security recovery. The model is the first of its kind to formally represent and simulate attacks on RFID systems from a survivability perspective and to measure the degree of survivability of an RFID system under different attacks.