eCite Digital Repository

How RFID Attacks Are Expressed In OUtput Data


Mirowski, LT and Hartnett, JS and Williams, RN, How RFID Attacks Are Expressed In OUtput Data, Proceeding International Symposium on Pervasive Systems, Algorithms, and Networks, 14-16 December 2009, Kaoshing, Taiwan, pp. 794-799. ISBN 978-0-7695-3908-9 (2009) [Refereed Conference Paper]

Not available

Copyright Statement

Copyright 2009 IEEE

DOI: doi:10.1109/I-SPAN.2009.99


Attacks at the "RFID layer", where tags and readers interact, appear in the output data used by the "strategic layer" to monitor or authorize entities. Previous research has used contextual information from the "real world layer" or "strategic layer" for attack detection purposes; this means that detection methods need to be customized to the application environment. In contrast, we introduce the concept of an "RFID Layer Context Model" to contextualize output data at the RFID layer. The improvement is that context at this layer is divorced from the application environment, and thus, attack detection does not need to be customized to the application. As the features we use are generic, this work takes the first steps towards automating the detection of attacks at the RFID layer.

Item Details

Item Type:Refereed Conference Paper
Keywords:RFID, Security, Attacks, Detection
Research Division:Information and Computing Sciences
Research Group:Artificial intelligence
Research Field:Modelling and simulation
Objective Division:Information and Communication Services
Objective Group:Information systems, technologies and services
Objective Field:Information systems, technologies and services not elsewhere classified
UTAS Author:Mirowski, LT (Dr Luke Mirowski)
UTAS Author:Hartnett, JS (Mrs Jacky Hartnett)
UTAS Author:Williams, RN (Dr Ray Williams)
ID Code:61154
Year Published:2009
Deposited By:Information and Communication Technology
Deposited On:2010-02-26
Last Modified:2012-03-21

Repository Staff Only: item control page