메뉴 건너뛰기




Volumn , Issue , 2009, Pages 33-42

EPC RFID tag security weaknesses and defenses: Passport cards, enhanced drivers licenses, and beyond

Author keywords

Authentication; Cloning; EPC; Passport card; RFID; WHTI

Indexed keywords

ANTI-CLONING; ELECTRONIC PRODUCT CODES; IDENTITY DOCUMENTS; RF-ID TAGS; SECURITY APPLICATION; SECURITY WEAKNESS; SYSTEM SECURITY; WASHINGTON STATE;

EID: 74049091231     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653668     Document Type: Conference Paper
Times cited : (62)

References (43)
  • 1
    • 74049096010 scopus 로고    scopus 로고
    • New York to o er enhanced driver's license. Newsday, 16 September 2008. Referenced October 2008 at http://www.newsday.com/services/newspaper/ printedition/tuesday/news/nynylice165845220sep16,0,5665783,print.story.
    • New York to o er enhanced driver's license. Newsday, 16 September 2008. Referenced October 2008 at http://www.newsday.com/services/newspaper/ printedition/tuesday/news/nynylice165845220sep16,0,5665783,print.story.
  • 2
    • 74049123758 scopus 로고    scopus 로고
    • Card format passport; changes to passport fee schedule [final action]; 22 CFR parts 22 and 51. Federal Register, 72(249):74169-74173, December 31, 2007. Referenced 2008 at http://www.gpoaccess.gov/fr.
    • Card format passport; changes to passport fee schedule [final action]; 22 CFR parts 22 and 51. Federal Register, 72(249):74169-74173, December 31, 2007. Referenced 2008 at http://www.gpoaccess.gov/fr.
  • 3
    • 74049123302 scopus 로고    scopus 로고
    • Card format passport; changes to passport fee schedule [proposed rule]; 22 CFR parts 22 and 51. Federal Register, 71(200):60928-60932, October 17, 2006. Referenced 2008 at http://www.gpoaccess.gov/fr.
    • Card format passport; changes to passport fee schedule [proposed rule]; 22 CFR parts 22 and 51. Federal Register, 71(200):60928-60932, October 17, 2006. Referenced 2008 at http://www.gpoaccess.gov/fr.
  • 4
    • 74049148338 scopus 로고    scopus 로고
    • Smart Card Alliance. Comments of the smart card alliance to the department of state federal register notice, \card format passport; changes to passport fee schedule, 22 CFR parts 22 and 51, rin 1400-ac22, public notice 5558, 3 November 2006. Referenced 2008 at http://www.smartcardalliance. org/resources/pdf/Smart Card Alliance Response Passport Card Final.pdf.
    • Smart Card Alliance. Comments of the smart card alliance to the department of state federal register notice, \card format passport; changes to passport fee schedule," 22 CFR parts 22 and 51, rin 1400-ac22, public notice 5558, 3 November 2006. Referenced 2008 at http://www.smartcardalliance. org/resources/pdf/Smart Card Alliance Response Passport Card Final.pdf.
  • 6
    • 74049091087 scopus 로고    scopus 로고
    • Online bibliography: Security and privacy in RFID systems, 2008. Referenced 2008 at
    • G. Avoine. Online bibliography: Security and privacy in RFID systems, 2008. Referenced 2008 at http://www.avoine.net/rid.
    • Avoine, G.1
  • 8
    • 84986346822 scopus 로고
    • The differential impact of abstract vs. concrete information on decisions
    • E. Borgida and R. E. Nisbett. The differential impact of abstract vs. concrete information on decisions. Journal of Applied Social Psychology, (7):258-271,1977.
    • (1977) Journal of Applied Social Psychology , vol.7 , pp. 258-271
    • Borgida, E.1    Nisbett, R.E.2
  • 10
    • 19644380066 scopus 로고    scopus 로고
    • The role of memory representation in the vigilance decrement
    • October
    • D. M. Caggiano and R. Parasuraman. The role of memory representation in the vigilance decrement. Psychonomic Bulletin and Review, 11(5):932-937, October 2004.
    • (2004) Psychonomic Bulletin and Review , vol.11 , Issue.5 , pp. 932-937
    • Caggiano, D.M.1    Parasuraman, R.2
  • 11
    • 85066934773 scopus 로고    scopus 로고
    • B. Danev, T. S. Heydt-Benjamin, and S. Capkun. Physical-layer identification of RFID devices. In 18th USENIX Security Symposium, pages 199{214, 2009.
    • B. Danev, T. S. Heydt-Benjamin, and S. Capkun. Physical-layer identification of RFID devices. In 18th USENIX Security Symposium, pages 199{214, 2009.
  • 12
    • 70350601194 scopus 로고    scopus 로고
    • F. D. Garcia, P. van Rossum, R. Verdult, and R. W. Schreur. Wirelessly pickpocketing a Mifare Classic card. In IEEE Symposium on Security and Privacy (S&P 2009), pages 3{15. IEEE, 2009.
    • F. D. Garcia, P. van Rossum, R. Verdult, and R. W. Schreur. Wirelessly pickpocketing a Mifare Classic card. In IEEE Symposium on Security and Privacy (S&P 2009), pages 3{15. IEEE, 2009.
  • 17
    • 74049145928 scopus 로고    scopus 로고
    • EPCglobal Inc. Class 1 generation 2 UHF air interface protocol standard version 1.1.0. Referenced 2008 at
    • EPCglobal Inc. Class 1 generation 2 UHF air interface protocol standard version 1.1.0. Referenced 2008 at http://www.epcglobalinc.org/standards/uhfc1g2/ uhfc1g2 1 1 0-standard-20071017.pdf.
  • 18
    • 84935078039 scopus 로고    scopus 로고
    • Security weaknesses in Bluetooth
    • D. Naccache, editor, The Cryptographer's Track at RSA, of, Springer-Verlag
    • M. Jakobsson and S. Wetzel. Security weaknesses in Bluetooth. In D. Naccache, editor, The Cryptographer's Track at RSA, volume 2020 of Lecture Notes in Computer Science, pages 176-191. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 176-191
    • Jakobsson, M.1    Wetzel, S.2
  • 19
    • 33749028998 scopus 로고    scopus 로고
    • Strengthing EPC tags against cloning
    • ACM Press
    • A. Juels. Strengthing EPC tags against cloning. In ACM Workshop on Wireless Security (WiSe), pages 67-76. ACM Press, 2005.
    • (2005) ACM Workshop on Wireless Security (WiSe) , pp. 67-76
    • Juels, A.1
  • 21
    • 33847249519 scopus 로고    scopus 로고
    • A. Juels, D. Molnar, and D. Wagner. Security and privacy issues in e-passports. In D. Gollman, G. Li, and G. Tsudik, editors, SecureComm, pages 74-88. IEEE, 2005. Referenced 2008 at http://eprint.iacr.org/2005/095.pdf.
    • A. Juels, D. Molnar, and D. Wagner. Security and privacy issues in e-passports. In D. Gollman, G. Li, and G. Tsudik, editors, SecureComm, pages 74-88. IEEE, 2005. Referenced 2008 at http://eprint.iacr.org/2005/095.pdf.
  • 22
    • 79957448997 scopus 로고    scopus 로고
    • Where's the beep?: Security, privacy, and user misunderstandings of RFID
    • J. King and A. Mcdiarmid. Where's the beep?: security, privacy, and user misunderstandings of RFID. In Useability, Psychology, and Security, pages 1-8, 2008.
    • (2008) Useability, Psychology, and Security , pp. 1-8
    • King, J.1    Mcdiarmid, A.2
  • 23
    • 72849133459 scopus 로고    scopus 로고
    • EPC RFID tags in security applications: Passport Cards, Enhanced Drivers Licenses, and beyond
    • Technical report. Available at
    • K. Koscher, A. Juels, T. Kohno, and V. Brajkovic. EPC RFID tags in security applications: Passport Cards, Enhanced Drivers Licenses, and beyond. Technical report. Available at ftp://ftp.cs.washington.edu/tr/2008/10/UW-CSE-08- 10-02.PDF.
    • Koscher, K.1    Juels, A.2    Kohno, T.3    Brajkovic, V.4
  • 24
    • 0000245521 scopus 로고    scopus 로고
    • Con rmation bias: A ubiquitous phenomenon in many guises
    • R. S. Nickerson. Con rmation bias: A ubiquitous phenomenon in many guises. Review of General Psychology, 2(2):175-220, 1998.
    • (1998) Review of General Psychology , vol.2 , Issue.2 , pp. 175-220
    • Nickerson, R.S.1
  • 25
    • 84893081352 scopus 로고    scopus 로고
    • Reverse-engineering a cryptographic RFID tag
    • K. Nohl, D. Evans, Starbug, and H. Plötz. Reverse-engineering a cryptographic RFID tag. In USENIX Security, pages 185-193, 2008.
    • (2008) USENIX Security , pp. 185-193
    • Nohl, K.1    Evans, D.2    Starbug3    Plötz, H.4
  • 26
    • 74049118636 scopus 로고    scopus 로고
    • F. Nylander. Alien Technology Higgs Gen2 IC LoadImage command application note 1 for 96 bit EPC memory, revision 7, 14 December 2006. Referenced 12 Sept. 2008 at http://www.alientechnology.com/docs/Load Image Applicaton Note 1.pdf.
    • F. Nylander. Alien Technology Higgs Gen2 IC LoadImage command application note 1 for 96 bit EPC memory, revision 7, 14 December 2006. Referenced 12 Sept. 2008 at http://www.alientechnology.com/docs/Load Image Applicaton Note 1.pdf.
  • 27
    • 74049132962 scopus 로고    scopus 로고
    • M. C. O'Connor. Industry group says e-passport clone poses little risk. RFID Journal, 9 August 2006. Referenced 2008 at http://www.rfidjournal. com/article/articleview/2559/1/1/.
    • M. C. O'Connor. Industry group says e-passport clone poses little risk. RFID Journal, 9 August 2006. Referenced 2008 at http://www.rfidjournal. com/article/articleview/2559/1/1/.
  • 28
    • 74049115691 scopus 로고    scopus 로고
    • United States Department of Homeland Security. Privacy impact assessment for the use of radio frequency identification (RFID) technology for border crossings, 22 January 2008. Referenced 2008 at http://www.dhs.gov/xlibrary/ assets/privacy/privacy pia cbp rfid.pdf.
    • United States Department of Homeland Security. Privacy impact assessment for the use of radio frequency identification (RFID) technology for border crossings, 22 January 2008. Referenced 2008 at http://www.dhs.gov/xlibrary/ assets/privacy/privacy pia cbp rfid.pdf.
  • 29
    • 74049140570 scopus 로고    scopus 로고
    • Washington State Department of Licensing. FAQ: EDL / ID, 2008. Referenced 2008 at http://www.dol.wa.gov/driverslicense/edlfaq.html.
    • Washington State Department of Licensing. FAQ: EDL / ID, 2008. Referenced 2008 at http://www.dol.wa.gov/driverslicense/edlfaq.html.
  • 30
    • 74049150150 scopus 로고    scopus 로고
    • OpenPCD project, at
    • OpenPCD project, 2008. Referenced 2008 at www.openpcd.org.
    • (2008) Referenced 2008
  • 31
    • 85094317081 scopus 로고    scopus 로고
    • A platform for RFID security and privacy administration
    • Current project information referenced at
    • M. R. Rieback, G. Gaydadjiev, B. Crispo, R. F. H. Hofman, and A. S. Tanenbaum. A platform for RFID security and privacy administration. In USENIX LISA, pages 89-102, 2006. Current project information referenced 2008 at www.rfidguardian.org.
    • (2006) USENIX LISA , pp. 89-102
    • Rieback, M.R.1    Gaydadjiev, G.2    Crispo, B.3    Hofman, R.F.H.4    Tanenbaum, A.S.5
  • 34
    • 74049091504 scopus 로고    scopus 로고
    • Read range for Gen2 RFID in 2008? 40 feet. RFID Update, 14 August 2008. Referenced 2008 at http://www.rfidupdate.com/articles/index.php?id=1656.
    • Read range for Gen2 RFID in 2008? 40 feet. RFID Update, 14 August 2008. Referenced 2008 at http://www.rfidupdate.com/articles/index.php?id=1656.
  • 36
    • 33750345292 scopus 로고    scopus 로고
    • A wirelessly-powered platform for sensing and computation
    • J. R. Smith, A. P. Sample, P. S. Powledge, S. Roy, and A. Mamishev. A wirelessly-powered platform for sensing and computation. In Ubicomp, pages 495-506, 2006.
    • (2006) Ubicomp , pp. 495-506
    • Smith, J.R.1    Sample, A.P.2    Powledge, P.S.3    Roy, S.4    Mamishev, A.5
  • 38
    • 74049130510 scopus 로고    scopus 로고
    • Identity Stronghold. Washington State Enhanced Drivers License guarded by Identity Stronghold Secure Sleeve. Company annotation on news article. Referenced 11 September 2008 at www.identitystronghold.com/links.php.
    • Identity Stronghold. Washington State Enhanced Drivers License guarded by Identity Stronghold Secure Sleeve. Company annotation on news article. Referenced 11 September 2008 at www.identitystronghold.com/links.php.
  • 39
    • 74049094184 scopus 로고    scopus 로고
    • C. Swedberg. All eyes on FDA for drug e-pedigree. RFID Journal, 2008. Referenced 2008 at http://www.rfidjournal.com/article/articleview/4013/1/ 1.
    • C. Swedberg. All eyes on FDA for drug e-pedigree. RFID Journal, 2008. Referenced 2008 at http://www.rfidjournal.com/article/articleview/4013/1/ 1.
  • 41
    • 0033768584 scopus 로고    scopus 로고
    • Perceived probability, perceived severity, and health-protective behavior
    • N. D. Weinstein. Perceived probability, perceived severity, and health-protective behavior. Health Psychology, 19:65-74, 2000.
    • (2000) Health Psychology , vol.19 , pp. 65-74
    • Weinstein, N.D.1
  • 42
    • 33144462296 scopus 로고    scopus 로고
    • Hacking the prox card
    • S. Garfinkel and B. Rosenberg, editors, Addison-Wesley
    • J. Westhues. Hacking the prox card. In S. Garfinkel and B. Rosenberg, editors, RFID: Applications, Security, and Privacy, pages 291-300. Addison-Wesley, 2005.
    • (2005) RFID: Applications, Security, and Privacy , pp. 291-300
    • Westhues, J.1
  • 43
    • 0034296795 scopus 로고    scopus 로고
    • A meta-analysis of fear appeals: Implications for effective public health campaigns
    • K. Witte and M. Allen. A meta-analysis of fear appeals: Implications for effective public health campaigns. Health Education and Behavior, 27(5):591-615, 2000.
    • (2000) Health Education and Behavior , vol.27 , Issue.5 , pp. 591-615
    • Witte, K.1    Allen, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.