eCite Digital Repository

An RFID attacker behaviour taxonomy


Mirowski, LT and Hartnett, JS and Williams, RN, An RFID attacker behaviour taxonomy, IEEE Pervasive Computing, 8, (4) pp. 79-84. ISSN 1536-1268 (2009) [Refereed Article]

Not available

Copyright Statement

Copyright © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.”

Official URL:

DOI: doi:10.1109/MPRV.2009.68


A taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems. RFID systems are classified by their informational goals-typically, authorization and monitoring. Authorization systems replace the more traditional approaches of granting an entity access to a particular zone, whereas monitoring systems establish an entity's location in that zone. Although their informational goals differ, the underlying hardware is identical for both types of systems; consequently, attacks at the hardware level are the same. However, because attacker behavior invalidates each subsystem's informational goals differently, RFID security requirements should consider these goals individually.

Item Details

Item Type:Refereed Article
Research Division:Information and Computing Sciences
Research Group:Cybersecurity and privacy
Research Field:Cybersecurity and privacy not elsewhere classified
Objective Division:Information and Communication Services
Objective Group:Communication technologies, systems and services
Objective Field:Communication technologies, systems and services not elsewhere classified
UTAS Author:Mirowski, LT (Dr Luke Mirowski)
UTAS Author:Hartnett, JS (Mrs Jacky Hartnett)
UTAS Author:Williams, RN (Dr Ray Williams)
ID Code:61158
Year Published:2009
Web of Science® Times Cited:9
Deposited By:Information and Communication Technology
Deposited On:2010-02-26
Last Modified:2014-12-09
Downloads:8 View Download Statistics

Repository Staff Only: item control page