%0 Conference Proceedings %T Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems %+ Centre of Excellence IT4Innovations %+ Technical University of Ostrava [Ostrava] (VSB) %A Moravec, Pavel %A Krumnikl, Michal %Z Part 7: Various Aspects of Computer Security %< avec comité de lecture %( Lecture Notes in Computer Science %B 16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM) %C Bialystok, Poland %Y Khalid Saeed %Y Władysław Homenda %Y Rituparna Chaki %I Springer International Publishing %3 Computer Information Systems and Industrial Management %V LNCS-10244 %P 672-684 %8 2017-06-16 %D 2017 %R 10.1007/978-3-319-59105-6_58 %K RFID %K Legacy access systems %K Identity token %K DS1990 %K EM4100 %K MIFARE classic %K Cloning %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X During the development of a new access system based on modern RFID technologies it was found that companies producing access control systems for residential and office buildings still prefer the use of existing cheap solutions instead of incorporating new technologies. This is mainly due to the additional costs new systems require.The used legacy technologies are however prone to identity token cloning which allows easy access of unauthorized people to buildings. In previous paper, we have already briefly described a way how to detect cloned RFID tokens in 125 kHz RFID system.This paper lists the risks of the legacy access systems and offers ways how to detect a cloned 125 kHz tag, 13.56 MHz RFID MIFARE Classic card or Dallas Semiconductors iButton access token and how to pro-actively disable them. %G English %Z TC 8 %2 https://inria.hal.science/hal-01656215/document %2 https://inria.hal.science/hal-01656215/file/448933_1_En_58_Chapter.pdf %L hal-01656215 %U https://inria.hal.science/hal-01656215 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC8 %~ IFIP-CISIM %~ IFIP-LNCS-10244