Openly accessible

Enhancing RFID tag resistance against cloning attack

Abawajy, Jemal 2009, Enhancing RFID tag resistance against cloning attack, in NSS 2009 : Proceedings of the third International Conference on Network and System Security, IEEE, Piscataway, N. J., pp. 18-23.

Attached Files
Name Description MIMEType Size Downloads
abawajy-enhancingrfid-2009.pdf Published version application/pdf 330.47KB 227

Title Enhancing RFID tag resistance against cloning attack
Author(s) Abawajy, Jemal
Conference name Network and System Security International Conference (3rd : 2009 : Gold Coast, Queensland)
Conference location Gold Coast, Queensland
Conference dates 19-21 Oct. 2009
Title of proceedings NSS 2009 : Proceedings of the third International Conference on Network and System Security
Editor(s) Xiang, Yang
Lopez, Javier
Wang, Haining
Zhou, Wanlei
Publication date 2009
Conference series Network and System Security International Conference
Start page 18
End page 23
Total pages 6
Publisher IEEE
Place of publication Piscataway, N. J.
Keyword(s) RFID
security
tag cloning
authentication
Summary In its current form, RFID system are susceptible to a range of malevolent attacks. With the rich business intelligence that RFID infrastructure could possibly carry, security is of paramount importance. In this paper, we formalise various threat models due tag cloning on the RFID system. We also present a simple but efficient and cost effect technique that strengthens the resistance of RFID tags to cloning attacks. Our techniques can even strengthen tags against cloning in environments with untrusted reading devices.
ISBN 9780769538389
Language eng
Field of Research 080504 Ubiquitous Computing
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2009, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30029111

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 338 Abstract Views, 227 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jun 2010, 13:47:18 EST by Leanne Swaneveld

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.