University of Tasmania
Browse

File(s) under permanent embargo

An RFID attacker behaviour taxonomy

journal contribution
posted on 2023-05-17, 01:34 authored by Mirowski, LT, Hartnett, JS, Williams, RN
A taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems. RFID systems are classified by their informational goals-typically, authorization and monitoring. Authorization systems replace the more traditional approaches of granting an entity access to a particular zone, whereas monitoring systems establish an entity's location in that zone. Although their informational goals differ, the underlying hardware is identical for both types of systems; consequently, attacks at the hardware level are the same. However, because attacker behavior invalidates each subsystem's informational goals differently, RFID security requirements should consider these goals individually.

History

Publication title

IEEE Pervasive Computing

Volume

8

Issue

4

Pagination

79-84

ISSN

1536-1268

Department/School

School of Information and Communication Technology

Publisher

Ieee Computer Soc

Place of publication

10662 Los Vaqueros Circle, Po Box 3014, Los Alamit

Rights statement

Copyright © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.”

Repository Status

  • Restricted

Socio-economic Objectives

Communication technologies, systems and services not elsewhere classified

Usage metrics

    University Of Tasmania

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC