메뉴 건너뛰기




Volumn 12, Issue 5, 2010, Pages 491-505

Classifying RFID attacks and defenses

Author keywords

Classification; RFID attacks; RFID security

Indexed keywords

CLASSIFICATION; EFFECTIVE ALGORITHMS; LOW COSTS; PERVASIVE COMPUTING TECHNOLOGY; RFID (RADIO FREQUENCY IDENTIFICATION); RFID ATTACKS; RFID COMMUNICATION; RFID NETWORKS; RFID SECURITY; TECHNICAL POTENTIAL;

EID: 78650174439     PISSN: 13873326     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10796-009-9210-z     Document Type: Conference Paper
Times cited : (190)

References (53)
  • 1
    • 78650178996 scopus 로고    scopus 로고
    • 22C3
    • 22C3 (2007). RFID Zapper. https://events.ccc.de/congress/2005/static/r/f/ i/RFID-Zapper(EN)-77f3.html. Accessed July 2009.
    • (2007) RFID Zapper
  • 2
    • 26444478592 scopus 로고    scopus 로고
    • RFID traceability: A multilayer problem
    • A.S. Patrick M. Yung (eds). Springer-Verlag Berlin, Heidelberg 10.1007/b137875 Avoine
    • G Avoine P Oechslin 2005 RFID traceability: A multilayer problem AS Patrick M Yung (eds) Financial cryptography and data security, 9th international C, FS 2005, Roseau, The Commonwealth of Dominica Lecture notes in computer science, security and cryptology 3570 Springer-Verlag Berlin, Heidelberg 125 140 10.1007/b137875 Avoine, G.; Oechslin, P. (2005). RFID traceability: A multilayer problem. In A. S. Patrick; M. Yung (Eds.), Financial cryptography and data security, 9th international C, FS 2005, Roseau, The Commonwealth of Dominica. Lecture notes in computer science, security and cryptology (Vol. 3570, pp. 125-140). Berlin, Heidelberg: Springer-Verlag. doi: 10.1007/b137875.
    • (2005) Financial Cryptography and Data Security, 9th International C, FS 2005, Roseau, the Commonwealth of Dominica Lecture Notes in Computer Science, Security and Cryptology , Issue.3570 , pp. 125-140
    • Avoine, G.1    Oechslin, P.2
  • 3
    • 84979828637 scopus 로고    scopus 로고
    • Roadmap to solving security and privacy concerns in RFID systems
    • DOI 10.1016/j.clsr.2007.09.005, PII S026736490700091X
    • J Ayoade 2007 Privacy and RFID systems, roadmap for solving security and privacy concerns in RFID systems Computer Law; Security Report 23 555 561 10.1016/j.clsr.2007.09.005 (Pubitemid 350026134)
    • (2007) Computer Law and Security Report , vol.23 , Issue.6 , pp. 555-561
    • Ayoade, J.1
  • 8
    • 84873856034 scopus 로고    scopus 로고
    • Emvelope
    • Emvelope (2005). Products. http://www.emvelope.com/products. Accessed July 2009.
    • (2005) Products
  • 9
  • 10
    • 78650172740 scopus 로고    scopus 로고
    • EPC radio-frequency identity protocols Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz
    • EPCGlobal Inc. (Vol. 1.2.0)
    • EPCGlobal Inc. (2005). EPC radio-frequency identity protocols Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz. Specification for RFID air interface. (Vol. 1.2.0). http://www.epcglobalinc.org/ standards/uhfc1g2/uhfc1g2-1-2-0-standard-20080511.pdf. Accessed July 2009.
    • (2005) Specification for RFID Air Interface
  • 11
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free Movement of such data
    • European Commission (L.281)
    • European Commission (1995). Directive 95/46/EC of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free Movement of such data. Official Journal of European Communities, (L.281), 31.
    • (1995) Official Journal of European Communities , pp. 31
  • 12
    • 78650174684 scopus 로고    scopus 로고
    • Cloning an electronic passport
    • European Digital Rights (EDRI-gram)
    • European Digital Rights (EDRI-gram) (2006). Cloning an electronic passport. EDRI-gram, digital civil rights in Europe. No. 4-16. http://www.edri.org/edrigram/number4.16/epassport/. Accessed July 2009.
    • (2006) EDRI-gram, Digital Civil Rights in Europe , Issue.4-16
  • 13
    • 37149018203 scopus 로고    scopus 로고
    • Federal Office for Information Security RFID consultation website
    • Federal Office for Information Security (2004). Security aspects and prospective applications of RFID systems. RFID consultation website. http://www.rfidconsultation.eu/docs/ficheiros/RIKCHA-englisch-Layout.pdf. Accessed July 2009.
    • (2004) Security Aspects and Prospective Applications of RFID Systems
  • 16
    • 23944477452 scopus 로고    scopus 로고
    • Some methods for privacy in RFID communication
    • C. Castellucia H. Hartenstein C. Paar D. Westhoff (eds). Springer Berlin 10.1007/b105219 Fishkin
    • K Fishkin S Roy B Jiang 2004 Some methods for privacy in RFID communication C Castellucia H Hartenstein C Paar D Westhoff (eds) Security in Ad-hoc and sensor networks, proceedings of the 1st European workshop on security (ESAS '04) Lecture notes in computer science, computer communication networks and telecommunications 3313 Springer Berlin 42 53 10.1007/b105219 Fishkin, K.; Roy, S.; Jiang, B. (2004). Some methods for privacy in RFID communication. In C. Castellucia, H. Hartenstein, C. Paar,; D. Westhoff (Eds.), Security in Ad-hoc and sensor networks, proceedings of the 1st European workshop on security (ESAS '04). Lecture notes in computer science, computer communication networks and telecommunications (Vol. 3313, pp. 42-53). Berlin: Springer. doi: 10.1007/b105219.
    • (2004) Security in Ad-hoc and Sensor Networks, Proceedings of the 1st European Workshop on Security (ESAS '04) Lecture Notes in Computer Science, Computer Communication Networks and Telecommunications , Issue.3313 , pp. 42-53
    • Fishkin, K.1    Roy, S.2    Jiang, B.3
  • 17
    • 26444442422 scopus 로고    scopus 로고
    • Scanning with a purpose-supporting the fair information principles in RFID protocols
    • H. Murakami H. Nakashima H. Tokuda M. Yasumura (eds). Springer Berlin 10.1007/11526858 Floerkemeier
    • C Floerkemeier R Schneider M Langheinrich 2004 Scanning with a purpose-supporting the fair information principles in RFID protocols H Murakami H Nakashima H Tokuda M Yasumura (eds) Ubiquitous computing systems, second international symposium (UCS '04), Tokyo, Japan Lecture notes in computer science 3598 Springer Berlin 214 231 10.1007/11526858 Floerkemeier, C.; Schneider, R.; Langheinrich, M. (2004). Scanning with a purpose-supporting the fair information principles in RFID protocols. In H. Murakami, H. Nakashima, H. Tokuda,; M. Yasumura (Eds.), Ubiquitous computing systems, second international symposium (UCS '04), Tokyo, Japan. Lecture notes in computer science (Vol.3598, pp. 214-231). Berlin: Springer. doi: 10.1007/11526858.
    • (2004) Ubiquitous Computing Systems, Second International Symposium (UCS '04), Tokyo, Japan Lecture Notes in Computer Science , Issue.3598 , pp. 214-231
    • Floerkemeier, C.1    Schneider, R.2    Langheinrich, M.3
  • 20
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • DOI 10.1109/MSP.2005.78
    • S Garfinkel A Juels R Pappu 2005 RFID privacy: An overview of problems and proposed solutions IEEE Security; Privacy 3 3 34 43 10.1109/MSP.2005.78 (Pubitemid 40860471)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 23
    • 77950473836 scopus 로고    scopus 로고
    • Security requirements for cryptographic modules
    • Information Technology Laboratory, National Institute of Standards and Technology FIPS PUB 140-2. 25 May 2001
    • Information Technology Laboratory, National Institute of Standards and Technology (2001). Security requirements for cryptographic modules. Federal information processing standards publication. FIPS PUB 140-2. 25 May 2001. http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf. Accessed July 2009.
    • (2001) Federal Information Processing Standards Publication
  • 25
    • 78650180345 scopus 로고    scopus 로고
    • International Civil Aviation Organization
    • International Civil Aviation Organization (2002). ICAO document 9303 - Part 1 machine readable passport (Vol. 2). http://www2.icao.int/en/MRTD/Pages/ Doc9393.aspx. Accessed July 2009.
    • (2002) ICAO Document 9303 - Part 1 Machine Readable Passport , vol.2
  • 26
    • 78650173168 scopus 로고    scopus 로고
    • International Organization for Standardization Part 2 (2008), Part 3 (1998), Part 4 (1999), Part 5 (2004) Accessed July 2009
    • International Organization for Standardization (2009). ISO/IEC 9798: Information technology-security techniques-entity authentication, Part 1(1997), Part 2 (2008), Part 3 (1998), Part 4 (1999), Part 5 (2004). www.iso.org. Accessed July 2009.
    • (1997) ISO/IEC 9798: Information Technology-security Techniques-entity Authentication , Issue.PART 1
  • 28
    • 33749028998 scopus 로고    scopus 로고
    • Stengthening EPC tags against cloning
    • M. Jakobsson R. Povendran (eds). ACM New York. 10.1145/1080793.1080805
    • Juels, A. (2005). Stengthening EPC tags against cloning. In M. Jakobsson; R. Povendran (Eds.), Proceedings of ACM workshop on wireless security (WiSec'05) (pp. 67-76). New York: ACM.
    • (2005) Proceedings of ACM Workshop on Wireless Security (WiSec'05) , pp. 67-76
    • Juels, A.1
  • 30
    • 33749011985 scopus 로고    scopus 로고
    • Disabling RFID tags with visible confirmation: Clipped tags are silenced
    • V. Atluri S.D.C. di Vimercanti R. Dingledine (eds). ACM Alexandria. 10.1145/1102199.1102205
    • Karjoth, G.; Moskowitz, P. A. (2005). Disabling RFID tags with visible confirmation: Clipped tags are silenced. In V. Atluri, S.D.C. di Vimercanti,; R. Dingledine (Eds.), Proceedings of the 2005 ACM workshop on privacy in the electronic society (WPES '05) (pp. 27-30). Alexandria: ACM.
    • (2005) Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES '05) , pp. 27-30
    • Karjoth, G.1    Moskowitz, P.A.2
  • 33
    • 33750466434 scopus 로고    scopus 로고
    • Malaysia car thieves steal finger
    • 31 March 2005
    • Kent, J. (2005). Malaysia car thieves steal finger. BBC News, 31 March 2005. http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm. Accessed July 2009.
    • (2005) BBC News
    • Kent, J.1
  • 36
    • 34548830678 scopus 로고    scopus 로고
    • Practical attacks against RFID
    • DOI 10.1016/S1353-4858(07)70080-6, PII S1353485807700806
    • A Laurie 2007 Practical attacks against RFID Network Security 9 4 7 10.1016/S1353-4858(07)70080-6 (Pubitemid 47449639)
    • (2007) Network Security , vol.2007 , Issue.9 , pp. 4-7
    • Laurie, A.1
  • 43
    • 78650178803 scopus 로고    scopus 로고
    • Raboud University Nijmegen 08-33A. Press Release Accessed July 2009
    • Raboud University Nijmegen (2008). Dismantling contactless smart cards. 08-33A. Press Release. http://www2.ru.nl/media/pressrelease.pdf. Accessed July 2009.
    • (2008) Dismantling Contactless Smart Cards
  • 45
    • 26444435642 scopus 로고    scopus 로고
    • RFID Guardian: A battery-powered mobile device for RFID privacy management
    • C. Boyd N. González M. Juan (eds). Springer Berlin 10.1007/11506157 Rieback
    • M Rieback B Crispo A Tanenbaum 2005 RFID Guardian: A battery-powered mobile device for RFID privacy management C Boyd N González M Juan (eds) Information security and privacy, proceedings of the 10th Australasian conference on information security and privacy (ACISP '05), Brisbane, Australia, July 4-6, 2005 Lecture notes in computer science, security and cryptology 3574 Springer Berlin 184 194 10.1007/11506157 Rieback, M.; Crispo, B.; Tanenbaum, A. (2005). RFID Guardian: A battery-powered mobile device for RFID privacy management. In C. Boyd, N. González,; M. Juan (Eds.), Information security and privacy, proceedings of the 10th Australasian conference on information security and privacy (ACISP '05), Brisbane, Australia, July 4-6, 2005. Lecture notes in computer science, security and cryptology (Vol. 3574, pp. 184-194). Berlin: Springer. doi: 10.1007/11506157.
    • (2005) Information Security and Privacy, Proceedings of the 10th Australasian Conference on Information Security and Privacy (ACISP '05), Brisbane, Australia, July 4-6, 2005 Lecture Notes in Computer Science, Security and Cryptology , Issue.3574 , pp. 184-194
    • Rieback, M.1    Crispo, B.2    Tanenbaum, A.3
  • 47
    • 78650178252 scopus 로고    scopus 로고
    • Riscure Accessed July 2009
    • Riscure (2006). Privacy issue in electronic passport. http://www.riscure.com/contact/privacy-issue-in-electronic-passport.html. Accessed July 2009.
    • (2006) Privacy Issue in Electronic Passport
  • 48
    • 33750297493 scopus 로고    scopus 로고
    • Location verification using secure distance bounding protocols
    • DOI 10.1109/MAHSS.2005.1542879, 1542879, 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005
    • Singlelee, D.; Preneel, B. (2005). Location verification using secure distance bounding protocols. In Proceedings of the 2nd IEEE international conference on mobile, Ad Hoc and sensor systems (MASS'05) (pp. 834-840). New York: IEEE Press. (Pubitemid 44612357)
    • (2005) 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005 , vol.2005 , pp. 834-840
    • Singelee, D.1    Preneel, B.2
  • 49
    • 78650178195 scopus 로고    scopus 로고
    • Broadcom introduces secure RFID chip
    • 29 June 2006
    • Swedberg, C. (2006). Broadcom introduces secure RFID chip. RFID Journal. 29 June 2006. http://rfidjournal.com/article/view/2464/1/1. Accessed July 2009.
    • (2006) RFID Journal
    • Swedberg, C.1
  • 52
    • 2942614621 scopus 로고    scopus 로고
    • Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
    • Weis, S. A. (2003) Security and privacy in radio-frequency identification devices. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology.
    • (2003) Security and Privacy in Radio-frequency Identification Devices
    • Weis, S.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.