Skip to Main content Skip to Navigation
Conference papers

50 Ways to Break RFID Privacy

Abstract : We present a taxonomy of attacks on user untraceability in RFID systems. In particular, we consider RFID systems in terms of a layered model comprising a physical layer, a communication layer, and an application layer. We classify the attacks on untraceability according to their layer and discuss their applicability.Our classification includes two new attacks. We first present an attack on the RFID protocol by Kim et al. targeting the communication-layer. We then show how an attacker could perform an application-layer attack on the public transportation system in Luxembourg.Finally, we show that even if all of his tags are untraceable a person may not be untraceable. We do this by exhibiting a realistic scenario in which the attacker uses the RFID profile of a person to trace him.
Document type :
Conference papers
Complete list of metadata

Cited literature [25 references]  Display  Hide  Download

https://hal.inria.fr/hal-01559457
Contributor : Hal Ifip <>
Submitted on : Monday, July 10, 2017 - 4:49:26 PM
Last modification on : Friday, November 8, 2019 - 3:06:02 PM
Long-term archiving on: : Wednesday, January 24, 2018 - 4:25:14 PM

File

978-3-642-20769-3_16_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Ton Deursen. 50 Ways to Break RFID Privacy. 6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.192-205, ⟨10.1007/978-3-642-20769-3_16⟩. ⟨hal-01559457⟩

Share

Metrics

Record views

389

Files downloads

292