Classifying RFID attacks and defenses

  • Authors:
  • Aikaterini Mitrokotsa;Melanie R. Rieback;Andrew S. Tanenbaum

  • Affiliations:
  • Information and Communication Theory Group, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, The Netherlands 2628 CD;Department of Computer Science, Vrije Universiteit, Amsterdam, The Netherlands 1081 HV;Department of Computer Science, Vrije Universiteit, Amsterdam, The Netherlands 1081 HV

  • Venue:
  • Information Systems Frontiers
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures. The goal of the paper is to categorize the existing weaknesses of RFID communication so that a better understanding of RFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.