Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality

Abstract : Radio frequency identification (RFID) is a core component of the Internet-of-Things. In certain cases the communication between the tag and the reader needs to be confidential. Some passive RFID tags have very limited computational power and can therefore not implement standard cryptographic mechanisms. This has led to several proposals where data sent by the RFID tag is ‘hidden’ by noisy signals generated by the RFID reader. The RFID reader can remove the noise but third-party adversaries cannot, thereby ensuring a confidential backward-channel for tag data without the need for cryptography. Although this is a promising research direction there are also some practical limitations on the effectiveness of such schemes. This paper shows that at least one recent scheme is vulnerable to data recovery despite varying the reader’s transmission power if there is a slight difference in the phase of the reader’s blocking signal and the tag’s data. We experimentally verify our attack and conclude that our eavesdropping and data recovery approach is effective and realistic. Finally we test three possible mitigation methods and show that two of the three approaches can provide protection against our attack while having little impact on the bit error rate of the reader in decoding the tag data.
Type de document :
Communication dans un congrès
Raja Naeem Akram; Sushil Jajodia. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-9311, pp.219-234, 2015, Information Security Theory and Practice. 〈10.1007/978-3-319-24018-3_14〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01442545
Contributeur : Hal Ifip <>
Soumis le : vendredi 20 janvier 2017 - 16:47:46
Dernière modification le : vendredi 20 janvier 2017 - 16:52:45
Document(s) archivé(s) le : vendredi 21 avril 2017 - 16:14:06

Fichier

978-3-319-24018-3_14_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Qiao Hu, Lavinia Dinca, Gerhard Hancke. Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality. Raja Naeem Akram; Sushil Jajodia. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-9311, pp.219-234, 2015, Information Security Theory and Practice. 〈10.1007/978-3-319-24018-3_14〉. 〈hal-01442545〉

Partager

Métriques

Consultations de la notice

36

Téléchargements de fichiers

13