eCite Digital Repository

How RFID Attacks Are Expressed In OUtput Data

Citation

Mirowski, LT and Hartnett, JS and Williams, RN, How RFID Attacks Are Expressed In OUtput Data, Proceeding International Symposium on Pervasive Systems, Algorithms, and Networks, 14-16 December 2009, Kaoshing, Taiwan, pp. 794-799. ISBN 978-0-7695-3908-9 (2009) [Refereed Conference Paper]


Preview
PDF
Restricted - Request a copy
287Kb
  

Copyright Statement

Copyright 2009 IEEE

DOI: doi:10.1109/I-SPAN.2009.99

Abstract

Attacks at the "RFID layer", where tags and readers interact, appear in the output data used by the "strategic layer" to monitor or authorize entities. Previous research has used contextual information from the "real world layer" or "strategic layer" for attack detection purposes; this means that detection methods need to be customized to the application environment. In contrast, we introduce the concept of an "RFID Layer Context Model" to contextualize output data at the RFID layer. The improvement is that context at this layer is divorced from the application environment, and thus, attack detection does not need to be customized to the application. As the features we use are generic, this work takes the first steps towards automating the detection of attacks at the RFID layer.

Item Details

Item Type:Refereed Conference Paper
Keywords:RFID, Security, Attacks, Detection
Research Division:Information and Computing Sciences
Research Group:Artificial Intelligence and Image Processing
Research Field:Simulation and Modelling
Objective Division:Information and Communication Services
Objective Group:Computer Software and Services
Objective Field:Application Tools and System Utilities
Author:Mirowski, LT (Dr Luke Mirowski)
Author:Hartnett, JS (Mrs Jacky Hartnett)
Author:Williams, RN (Dr Ray Williams)
ID Code:61154
Year Published:2009
Deposited By:Information and Communication Technology
Deposited On:2010-02-26
Last Modified:2012-03-21
Downloads:0

Repository Staff Only: item control page