eCite Digital Repository

An RFID attacker behaviour taxonomy

Citation

Mirowski, LT and Hartnett, JS and Williams, RN, An RFID attacker behaviour taxonomy, IEEE Pervasive Computing, 8, (4) pp. 79-84. ISSN 1536-1268 (2009) [Refereed Article]


Preview
PDF
Restricted - Request a copy
1Mb
  

Copyright Statement

Copyright © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.”

Official URL: http://ieeexplore.ieee.org

DOI: doi:10.1109/MPRV.2009.68

Abstract

A taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems. RFID systems are classified by their informational goals-typically, authorization and monitoring. Authorization systems replace the more traditional approaches of granting an entity access to a particular zone, whereas monitoring systems establish an entity's location in that zone. Although their informational goals differ, the underlying hardware is identical for both types of systems; consequently, attacks at the hardware level are the same. However, because attacker behavior invalidates each subsystem's informational goals differently, RFID security requirements should consider these goals individually.

Item Details

Item Type:Refereed Article
Research Division:Information and Computing Sciences
Research Group:Computer Software
Research Field:Computer System Security
Objective Division:Information and Communication Services
Objective Group:Communication Networks and Services
Objective Field:Communication Networks and Services not elsewhere classified
Author:Mirowski, LT (Mr Luke Mirowski)
Author:Hartnett, JS (Mrs Jacky Hartnett)
Author:Williams, RN (Dr Ray Williams)
ID Code:61158
Year Published:2009
Web of Science® Times Cited:9
Deposited By:Information and Communication Technology
Deposited On:2010-02-26
Last Modified:2014-12-09
Downloads:8 View Download Statistics

Repository Staff Only: item control page