Security Analysis of RFID Relay Attacks

被引:2
|
作者
Guizani, Sghaier [1 ]
机构
[1] Alfaisal Univ, Coll Engn, Riyadh, Saudi Arabia
来源
JOURNAL OF INTERNET TECHNOLOGY | 2016年 / 17卷 / 02期
关键词
RFID; Security; Product code; Relay attacks; Intelligent systems;
D O I
10.6138/JIT.2016.17.2.20140614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent practical deployment of radio frequency identification (RFID) technologies is becoming widespread in almost all kinds of wireless network-based applications. As anticipated, most of the applications based on sensor networks, ad-hoc and or mobile ad hoc networks (MANETs) can highly benefit from the adoption of RFID solutions. RFID tags store valuable information and can easily be subjected to unauthorized reading, tempering with and possible other uses, which can lead to many unknown activities. RFID tags are also vulnerable to different forms of relay attacks. In this article, we present a probabilistic approach to check and verify the flexibility of the RFID protocols against possible relay attacks, channels and application specific parameters are also considered in the analysis. Then we show how an attack can be avoided. Future work is presented at the conclusion.
引用
收藏
页码:191 / 196
页数:6
相关论文
共 50 条
  • [1] Analysis of Relay Attacks on RFiD Systems
    Lima, J. A.
    Miri, A.
    Nevins, M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (01) : 1274 - 1282
  • [2] Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems
    Jannati, Hoda
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 11 : 51 - 61
  • [3] Security Analysis of NFC Relay Attacks using Probabilistic Model Checking
    Alexiou, Nikolaos
    Basagiannis, Stylianos
    Petridou, Sophia
    [J]. 2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 524 - 529
  • [4] Research on Defense Technology of Relay Attacks in RFID systems
    Shen, Weiwei
    Xu, He
    Sun, Rui
    Wang, Ruchuan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 18 - 22
  • [5] On Detecting Relay Attacks on RFID Systems Using Qubits
    Abidin, Aysajan
    [J]. CRYPTOGRAPHY, 2020, 4 (02) : 1 - 12
  • [6] Data desynchronization attacks on RFID security protocols
    Cao, Zheng
    Ma, Jianfeng
    Yang, Lin
    Deng, Miaolei
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (04): : 65 - 69
  • [7] RFID: An Appraisal of Malevolent Attacks on RFID Security System and its Resurgence
    Pandian, M. Thurai
    Sukumar, R.
    [J]. PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE IN MOOC, INNOVATION AND TECHNOLOGY IN EDUCATION (MITE), 2013, : 17 - +
  • [8] On addressing RFID/NFC-based relay attacks: An overview
    Tu, Yu-Ju
    Piramuthu, Selwyn
    [J]. DECISION SUPPORT SYSTEMS, 2020, 129
  • [9] Chaotic masking for securing RFID systems against relay attacks
    Malek, Behzad
    Miri, Ali
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1496 - 1508
  • [10] Classification of major security attacks against RFID systems
    El Beqqal, Mohamed
    Azizi, Mostafa
    [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,