University of Tasmania
Browse

File(s) under permanent embargo

How RFID Attacks Are Expressed In OUtput Data

conference contribution
posted on 2023-05-23, 04:40 authored by Mirowski, LT, Hartnett, JS, Williams, RN
Attacks at the “RFID layer”, where tags and readers interact, appear in the output data used by the “strategic layer” to monitor or authorize entities. Previous research has used contextual information from the “real world layer” or “strategic layer” for attack detection purposes; this means that detection methods need to be customized to the application environment. In contrast, we introduce the concept of an “RFID Layer Context Model” to contextualize output data at the RFID layer. The improvement is that context at this layer is divorced from the application environment, and thus, attack detection does not need to be customized to the application. As the features we use are generic, this work takes the first steps towards automating the detection of attacks at the RFID layer.

History

Publication title

Proceeding International Symposium on Pervasive Systems, Algorithms, and Networks

Editors

RF de Mello, Song Wu

Pagination

794-799

ISBN

978-0-7695-3908-9

Department/School

School of Information and Communication Technology

Publisher

IEEE Computer Society Conference Publishing Services (CPS)

Place of publication

Los Alamitos, California

Event title

I-SPAN: International Symposium on Pervasive Systems, Algorithms, and Networks

Event Venue

Kaoshing, Taiwan

Date of Event (Start Date)

2009-12-14

Date of Event (End Date)

2009-12-16

Rights statement

© Copyright 2009 IEEE

Repository Status

  • Restricted

Socio-economic Objectives

Information systems, technologies and services not elsewhere classified

Usage metrics

    University Of Tasmania

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC