RFID System Security Assessment Methodology Based on Attack Graph Model

被引:0
|
作者
Yang, Xiaoming [1 ]
Wang, Jiahao [1 ]
Huang, Yifu [1 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Sichuan, Peoples R China
关键词
RFID attacks library; atomic attack; attack graph model;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In order to effectively evaluate the security level of an applicable RFID system, researchers usually need to carry out a series of penetration test from the view of attackers. According to the extent of the attacker's effort, security level of the RFID system can be assessed by both qualitative and quantitative method. A new attack graph mechanism based on the characteristics of the RFID offensive and defensive attack strategy is proposed by analyzing the activities of existing RFID attacks. By analyzing the attack characteristics of different RFID systems, the proposed graph model can automatically evaluate the attack vulnerabilitie and dynamically predict the trend of attack effect in RFID system. By analyzing the attack instances on RFID UHF EPC C1 Gen2 protocol, the validity of the attack graph model is verified.
引用
收藏
页码:1161 / 1166
页数:6
相关论文
共 50 条
  • [1] Random Graph Based Benchmarking Methodology for RFID Security Protocols
    Chang, Shan
    Song, Hui
    Lu, Li
    Yao, Qingsong
    Qi, Yong
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 184 - 191
  • [2] Research on attack model and security mechanism of RFID system
    Wang, Tian
    Wu, Shisong
    Li, Qian
    Luo, Hengfeng
    Liu, Ruiqi
    [J]. ADVANCES IN ENERGY, ENVIRONMENT AND MATERIALS SCIENCE, 2016, : 819 - 822
  • [3] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
  • [4] Network Security Risk Assessment System Based on Attack Graph and Markov Chain
    Sun, Fuxiong
    Pi, Juntao
    Lv, Jin
    Cao, Tian
    [J]. 2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [5] Attack Graph-Based Quantitative Assessment for Industrial Control System Security
    Zhang, Yaofang
    Wang, Bailing
    Wu, Chenrui
    Wei, Xiaojie
    Wang, Zibo
    Yin, Guohua
    [J]. 2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 1748 - 1753
  • [6] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [7] Host security assessment method based on attack graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99
  • [8] Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model
    Li, Yunpeng
    Li, Xi
    [J]. SCIENTIFIC PROGRAMMING, 2021, 2021
  • [9] Network Security Situation Assessment Methods and Tactics Based on Multivariate Spatiotemporal Attack Graph Model
    Zhou, Anshun
    Huo, Mingde
    [J]. 20TH INT CONF ON UBIQUITOUS COMP AND COMMUNICAT (IUCC) / 20TH INT CONF ON COMP AND INFORMATION TECHNOLOGY (CIT) / 4TH INT CONF ON DATA SCIENCE AND COMPUTATIONAL INTELLIGENCE (DSCI) / 11TH INT CONF ON SMART COMPUTING, NETWORKING, AND SERV (SMARTCNS), 2021, : 541 - 548
  • [10] Study of network security evaluation based on attack graph model
    Electronic Engineering Institute, Hefei 230037, China
    不详
    [J]. Tongxin Xuebao, 2007, 3 (29-34):