Cryptography and Network Security (4th Edition)
Cryptography and Network Security (4th Edition)
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Computer Networking: A Top-Down Approach
Computer Networking: A Top-Down Approach
Feasibility study for automatic calibration of transportation simulation models
Proceedings of the 44th Annual Simulation Symposium
Proceedings of the 44th Annual Simulation Symposium
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Hi-index | 0.00 |
As Electronic Toll Collection (ETC) systems, such as E-ZPass, expands to cope with increasing development of the world's highway transportation infrastructure and generate public revenue, they have also become the subject of security attacks like any information system. Traditional security solutions are not applicable to ETC systems due to limited computing/storage resources and mobility requirements. Most ETC systems use Radio Frequency Identification (RFID) technology to identify vehicles and communicate messages, which makes the systems vulnerable to eavesdrop by the nature of open wireless channels. This paper addresses the unique characteristics of ETC systems and focuses on a particular kind of network security threats named replay attacks. We propose two methods; time-out delay and randomized ID renewal that will eliminate or greatly reduce the success of attacks. Both methods will deny access to the attacker in an attempt to replay the genuine user's ID. Through simulation, we demonstrate the effectiveness of our approach under various scenarios. Our simulation tool can also be used for education purposes to illustrate the underlying principles of various security attacks to ETC systems.