Analysis of Vulnerabilities in Radio Frequency Identification (RFID) Systems

被引:0
|
作者
Jain, Rajat [1 ]
Chaudhary, Dev Kumar [1 ]
Kumar, Sanjiv [1 ]
机构
[1] Amity Univ, Noida, Uttar Pradesh, India
关键词
RFID; Protocols; vulnerabilities;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of writing this paper is to analyze the types of vulnerabilities that can be found in radio frequency identification (RFID) systems and to check how easy or difficult it is to compromise the security of RFID tags. This paper presents two major attacks, a denial of service attack (dos attack) in which the RFID reader denies to identify a card. The second most effective attack is cloning the RFID card and get the access. These attacks can be carried out using some basic hardware that includes a microcontroller and an RFID reader/writer. Although the companies that make RFID tags have started making many secure cards that are immune to any third party readers but still there exist some types of cards that can be easily read by these readers since these cards are very cost effective hence they are widely used and their security vulnerabilities should be analyzed properly so that these attacks can be prevented.
引用
收藏
页码:453 / 457
页数:5
相关论文
共 50 条
  • [21] Radio frequency identification (RFID): research trends and framework
    Irani, Zahir
    Gunasekaran, Angappa
    Dwivedi, Yogesh K.
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2010, 48 (09) : 2485 - 2511
  • [22] Medical Application Based on Radio Frequency Identification (RFID)
    Wang, Hong
    Wu, Fei
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 451 - 454
  • [23] Radio Frequency Identification (RFID) in Healthcare: A Literature Review
    Kolokathi, Aikaterini
    Rallis, Panagiotis
    INFORMATICS, MANAGEMENT AND TECHNOLOGY IN HEALTHCARE, 2013, 190 : 157 - 159
  • [24] Radio Frequency Identification (RFID) system leads the way
    Heimlicher, Peter
    Konstruktion, 2007, (06): : 58 - 60
  • [25] Radio Frequency Identification (RFID) technology and patient safety
    Ajami, Sima
    Rajabzadeh, Ahmad
    JOURNAL OF RESEARCH IN MEDICAL SCIENCES, 2013, 18 (09): : 809 - 813
  • [26] Applications of Radio Frequency Identification (RFID) in Mining Industries
    Mahmad, Mohd Khairul Nizam
    Rozainy, Mohd Remy M. A. Z.
    Baharun, Norlia
    INTERNATIONAL CONFERENCE ON INNOVATIVE RESEARCH - ICIR EUROINVENT 2016, 2016, 133
  • [27] Radio frequency identification (RFID) applied to surgical sponges
    A. Rogers
    E. Jones
    D. Oleynikov
    Surgical Endoscopy, 2007, 21 : 1235 - 1237
  • [28] Radio frequency identification (RFID) applied to surgical sponges
    Rogers, A.
    Jones, E.
    Eynikov, D.
    SURGICAL ENDOSCOPY AND OTHER INTERVENTIONAL TECHNIQUES, 2007, 21 (07): : 1235 - 1237
  • [29] Radio Frequency Identification (RFID) Application at Dell Computer
    Crowl, Steve
    Mares, Victor
    Moore, Michael
    2006 IEEE/UT ENGINEERING MANAGEMENT CONFERENCE, 2006, : 18 - +
  • [30] MODELING OF TAX INSTALLMENT BY RADIO FREQUENCY IDENTIFICATION (RFID)
    Pornpanomchai, Chomtip
    Sornsang, Supot
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL I, PROCEEDINGS, 2008, : 595 - 599