posted on 2023-05-17, 01:34authored byMirowski, LT, Hartnett, JS, Williams, RN
A taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems. RFID systems are classified by their informational goals-typically, authorization and monitoring. Authorization systems replace the more traditional approaches of granting an entity access to a particular zone, whereas monitoring systems establish an entity's location in that zone. Although their informational goals differ, the underlying hardware is identical for both types of systems; consequently, attacks at the hardware level are the same. However, because attacker behavior invalidates each subsystem's informational goals differently, RFID security requirements should consider these goals individually.
History
Publication title
IEEE Pervasive Computing
Volume
8
Issue
4
Pagination
79-84
ISSN
1536-1268
Department/School
School of Information and Communication Technology
Publisher
Ieee Computer Soc
Place of publication
10662 Los Vaqueros Circle, Po Box 3014, Los Alamit