New security problem in RFID systems “tag killing”

  • Authors:
  • Dong-Guk Han;Tsuyoshi Takagi;Ho Won Kim;Kyo Il Chung

  • Affiliations:
  • Center for Information and Security Technologies(CIST), Korea University, Seoul, Korea;Future University-Hakodate, Japan;Electronics and Telecommunications Research Institute(ETRI), Korea;Electronics and Telecommunications Research Institute(ETRI), Korea

  • Venue:
  • ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as “Tag Killing” which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with “Tag Killing” adversary model and we show that most of them have weaknesses and are vulnerable to it.