File(s) under permanent embargo
How RFID Attacks Are Expressed In OUtput Data
conference contribution
posted on 2023-05-23, 04:40 authored by Mirowski, LT, Hartnett, JS, Williams, RNAttacks at the “RFID layer”, where tags and readers interact, appear in the output data used by the “strategic layer” to monitor or authorize entities. Previous research has used contextual information from the “real world layer” or “strategic layer” for attack detection purposes; this means that detection methods need to be customized to the application environment. In contrast, we introduce the concept of an “RFID Layer Context Model” to contextualize output data at the RFID layer. The improvement is that context at this layer is divorced from the application environment, and thus, attack detection does not need to be customized to the application. As the features we use are generic, this work takes the first steps towards automating the detection of attacks at the RFID layer.
History
Publication title
Proceeding International Symposium on Pervasive Systems, Algorithms, and NetworksEditors
RF de Mello, Song WuPagination
794-799ISBN
978-0-7695-3908-9Department/School
School of Information and Communication TechnologyPublisher
IEEE Computer Society Conference Publishing Services (CPS)Place of publication
Los Alamitos, CaliforniaEvent title
I-SPAN: International Symposium on Pervasive Systems, Algorithms, and NetworksEvent Venue
Kaoshing, TaiwanDate of Event (Start Date)
2009-12-14Date of Event (End Date)
2009-12-16Rights statement
© Copyright 2009 IEEERepository Status
- Restricted