50 Ways to Break RFID Privacy - Privacy and Identity Management for Life
Conference Papers Year : 2011

50 Ways to Break RFID Privacy

Abstract

We present a taxonomy of attacks on user untraceability in RFID systems. In particular, we consider RFID systems in terms of a layered model comprising a physical layer, a communication layer, and an application layer. We classify the attacks on untraceability according to their layer and discuss their applicability.Our classification includes two new attacks. We first present an attack on the RFID protocol by Kim et al. targeting the communication-layer. We then show how an attacker could perform an application-layer attack on the public transportation system in Luxembourg.Finally, we show that even if all of his tags are untraceable a person may not be untraceable. We do this by exhibiting a realistic scenario in which the attacker uses the RFID profile of a person to trace him.
Fichier principal
Vignette du fichier
978-3-642-20769-3_16_Chapter.pdf (179.45 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01559457 , version 1 (10-07-2017)

Licence

Identifiers

Cite

Ton Van Deursen. 50 Ways to Break RFID Privacy. 6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.192-205, ⟨10.1007/978-3-642-20769-3_16⟩. ⟨hal-01559457⟩
384 View
112 Download

Altmetric

Share

More