A tamper detection method for RFID tag data

被引:7
|
作者
Yamamoto, Akira [1 ]
Suzuki, Shigeya [2 ]
Hada, Hisakazu [2 ]
Mitsugi, Jin [2 ]
Teraoka, Fumio [3 ]
Nakamura, Osamu [4 ]
机构
[1] Keio Univ, Grad Sch Sci & Technol, Kohoku Ku, 3-14-1 Hiyoshi, Kanagawa, Japan
[2] Keio Univ, Grad sch Media & Governance, Fujisawa, Kanagawa, Japan
[3] Keio Univ, Fac Sci & Technol, Dept Informat & Comp Sci, Yokohama, Kanagawa, Japan
[4] Keio Univ, Fac Environm Informat, Fujisawa, Kanagawa, Japan
关键词
D O I
10.1109/RFID.2008.4519365
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, system designers, especially in the field of product life-cycle management system start considering use of user memory bank of UHF RFID tags. By storing most useful life-cycle data onto a tag, user can access to the data even without access to back-end databases. One of the major issues to make use of the user memory bank is detection of memory tampering. Although technology vendors start introducing new functionalities such as fine grained locking along with high capacity user memory, these tags with new functionalities require new non-standardized air protocol to operate - require modified version of reader/writers. Also, these tags are usually more expensive. In this paper, we introduce a novel approach to this problem: tag side write journaling mechanism and "Tag Memory Cloaking," which protect the journal by using. Tag Private Memory region, which is only readable and not writable from external devices such as a reader/writer, but writable by tag itself. Also, any write to the user memory automatically add journal entry - offset and length of the write - into the Tag Private Memory region. Later, a user can check existence of overlapped writes to user memory by checking the journal records. Since we have not modified any of air protocol, standard compliant read/writer can fully capable of all of our proposed operations: write to the tag, read, then detect unusual modification to user memory area. We have implemented the functionality to Programmable Battery Assisted Passive tag (BAP), then validated the method with several standard compliant reader/writers.
引用
收藏
页码:51 / +
页数:2
相关论文
共 50 条
  • [1] Fragile Watermarking for Tamper Detection in RFID Tag using Arnold Transform
    Patil, Kishor T.
    Patil, Deepali K.
    Narayankhedkar, Santosh K.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [2] A Battery-free RFID Sensor Tag with Fiber-optic Tamper Detection
    Hoang, Alexander T.
    Coonley, Kip D.
    Nekoogar, Faranak
    Reynolds, Matthew S.
    [J]. 2016 IEEE SENSORS, 2016,
  • [3] Detection of Data from the UWB Microstrip Resonator Type RFID Tag
    Hossain, A. K. M. Z.
    Ibrahimy, M. I.
    Motakabber, S. M. A.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING (ICCNEEE), 2015, : 414 - 417
  • [4] Tamper detection in RFID tags using fragile watermarking
    Potdar, Vidyasagar
    Chang, Elizabeth
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-6, 2006, : 3026 - +
  • [5] An Innovative Method Based on Wavelet Analysis for Chipless RFID Tag Detection
    Su, Chen
    Wang, Xueyuan
    Zou, Chuanyun
    Jiao, Liangyu
    Tao, Yuchuan
    [J]. ELECTRONICS, 2024, 13 (12)
  • [6] Passive UHF-RFID Tag With Printed Security Features for Authentication and Tamper Resistance
    Enakerakpo, Emuobosan
    Umar, Ashraf
    Alhendi, Mohammed
    Al-Haidari, Riadh
    Richmond, Dylan J.
    Somarathna, Udara Sandakelum
    Gonya, Stephen
    Poliks, Mark D.
    Rovere, Tom
    Beckford, Matthew
    Nichols, Jonathan
    [J]. IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION, 2024, 8 : 49 - 57
  • [7] Efficient tag detection in RFID systems
    Carbunar, Bogdan
    Ramanathan, Murali Krishna
    Koyuturk, Mehmet
    Jagannathan, Suresh
    Grama, Ananth
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2009, 69 (02) : 180 - 196
  • [8] Analysis of tag detection in RFID system
    College of Publish, Hangzhou Dianzi University, Hangzhou 310018, China
    [J]. Yi Qi Yi Biao Xue Bao, 2008, SUPPL. (68-71):
  • [9] A Simple Method for Anonymous Tag Cardinality Estimation in RFID Systems with False Detection
    Nguyen, Chuyen T.
    Hoang, Tuyen T.
    Phan, Vu X.
    [J]. 2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 101 - 104
  • [10] Tamper Detection in RFID Tags Using Zero-watermarks
    Yao, Xiaoming
    Chen, Hongyu
    Li, Honglei
    Zhou, Xiaoyi
    [J]. SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 169 - 172