File(s) under permanent embargo
An RFID attacker behaviour taxonomy
journal contribution
posted on 2023-05-17, 01:34 authored by Mirowski, LT, Hartnett, JS, Williams, RNA taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems. RFID systems are classified by their informational goals-typically, authorization and monitoring. Authorization systems replace the more traditional approaches of granting an entity access to a particular zone, whereas monitoring systems establish an entity's location in that zone. Although their informational goals differ, the underlying hardware is identical for both types of systems; consequently, attacks at the hardware level are the same. However, because attacker behavior invalidates each subsystem's informational goals differently, RFID security requirements should consider these goals individually.
History
Publication title
IEEE Pervasive ComputingVolume
8Issue
4Pagination
79-84ISSN
1536-1268Department/School
School of Information and Communication TechnologyPublisher
Ieee Computer SocPlace of publication
10662 Los Vaqueros Circle, Po Box 3014, Los AlamitRights statement
Copyright © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.”Repository Status
- Restricted