50 Ways to Break RFID Privacy - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2011

50 Ways to Break RFID Privacy

Ton Van Deursen
  • Fonction : Auteur
  • PersonId : 1012326

Résumé

We present a taxonomy of attacks on user untraceability in RFID systems. In particular, we consider RFID systems in terms of a layered model comprising a physical layer, a communication layer, and an application layer. We classify the attacks on untraceability according to their layer and discuss their applicability.Our classification includes two new attacks. We first present an attack on the RFID protocol by Kim et al. targeting the communication-layer. We then show how an attacker could perform an application-layer attack on the public transportation system in Luxembourg.Finally, we show that even if all of his tags are untraceable a person may not be untraceable. We do this by exhibiting a realistic scenario in which the attacker uses the RFID profile of a person to trace him.
Fichier principal
Vignette du fichier
978-3-642-20769-3_16_Chapter.pdf (179.45 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01559457 , version 1 (10-07-2017)

Licence

Paternité

Identifiants

Citer

Ton Van Deursen. 50 Ways to Break RFID Privacy. 6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.192-205, ⟨10.1007/978-3-642-20769-3_16⟩. ⟨hal-01559457⟩
361 Consultations
87 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More