HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems

Abstract : During the development of a new access system based on modern RFID technologies it was found that companies producing access control systems for residential and office buildings still prefer the use of existing cheap solutions instead of incorporating new technologies. This is mainly due to the additional costs new systems require.The used legacy technologies are however prone to identity token cloning which allows easy access of unauthorized people to buildings. In previous paper, we have already briefly described a way how to detect cloned RFID tokens in 125 kHz RFID system.This paper lists the risks of the legacy access systems and offers ways how to detect a cloned 125 kHz tag, 13.56 MHz RFID MIFARE Classic card or Dallas Semiconductors iButton access token and how to pro-actively disable them.
Complete list of metadata

Cited literature [15 references]  Display  Hide  Download

Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Tuesday, December 5, 2017 - 2:57:03 PM
Last modification on : Saturday, June 1, 2019 - 11:34:02 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Pavel Moravec, Michal Krumnikl. Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems. 16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.672-684, ⟨10.1007/978-3-319-59105-6_58⟩. ⟨hal-01656215⟩



Record views


Files downloads