Deakin University
Browse

File(s) under permanent embargo

Securing RFID systems from SQLIA

chapter
posted on 2011-01-01, 00:00 authored by Harinda Fernando, Jemal AbawajyJemal Abawajy
While SQL injection attacks have been plaguing web applications for years the threat they pose to RFID systems have only identified recently. Because the architecture of web systems and RFID systems differ considerably the prevention and detection techniques proposed for web applications are not suitable for RFID systems. In this paper we propose a system to secure RFID systems against tag based SQLIA. Our system is optimized for the architecture of RFID systems and consists of a query structure matching technique and tag data cleaning technique. The novelty of the proposed system is that it's specifically aimed at RFID systems and has the ability to detect and prevent second order injections which is a problem most current solutions haven't addressed. The preliminary evaluation of our query matching technique is very promising showing very high detection rate with minimal false positives.

History

Title of book

Algorithms and architectures for parallel processing

Series

Lecture notes in computer science; v. 7017

Chapter number

24

Pagination

245 - 254

Publisher

Springer-Verlag

Place of publication

Berlin, Germany

ISSN

0302-9743

eISSN

1611-3349

ISBN-13

9783642246494

Language

eng

Notes

Proceedings, Part II of the 11th International Conference, ICA3PP 2011, Melbourne, Australia, October 24-26, 2011.

Publication classification

B1 Book chapter

Copyright notice

2011, Springer-Verlag Berlin

Extent

38

Editor/Contributor(s)

Y Xiang, A Cuzzocrea, M Hobbs, W Zhou

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC