Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1741866.1741870acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

RFID survivability quantification and attack modeling

Published: 22 March 2010 Publication History

Abstract

In this paper, we present an RFID survivability experiment and quantitatively measure the degree of survivability of an RFID system under varying attacks. By modeling different malicious scenarios using stochastic process algebras, we show the different effects of those attacks on an RFID system's ability to provide critical services even when some components have been damaged. Our model relates its statistic to the attack strategies and security recovery. The model is the first of its kind to formally represent and simulate attacks on RFID systems from a survivability perspective and to measure the degree of survivability of an RFID system under different attacks.

References

[1]
M. Rieback, B. Crispo, and A. Tanenbaum, "Is Your Cat Infected with a Computer Virus?" Fourth Annual IEEE International Conference on Pervasive Computing and Communications, March 13-17, 2006, Pisa, Italy.
[2]
R. Ellison, D. Fisher, R. Linger, and H. Lipson, "Survivable Network Systems: An Emerging Discipline", Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, 1997.
[3]
J. Knight, E. Strunk, and K. Sullivan, "Towards a Rigorous Definition of Information System Survivability", DARPA Information Survivability Conference and Exposition, April 22-24, 2003, Washington, DC, USA.
[4]
E. Strunk and J. Knight, "Dependability Through Assured Reconfiguration in Embedded Systems Software", IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 3, pp. 172--187, July 2006.
[5]
A. Snow, U. Varshney, and A. Malloy, "Reliability and Survivability of Wireless and Mobile Networks", IEEE Computer, 33(7), pp. 49--55, July 2000.
[6]
A. Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal on Selected Areas in Communication, 24(2), February 2006.
[7]
S. Piramuthu, "Protocols for RFID Tag/Reader Authentication", Decision Support Systems, (43) pp. 897--914, 2007.
[8]
C. Lim, and T. Kwon, "Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer", The 8th Conference on Information and Communications Security, December 4-7, 2006, Raleigh, NC, USA.
[9]
N. Hopper, and M. Blum, "Secure Human Identification Protocols", In C. Boyd (ed.) Advances in Cryptology -- ASIA CRYPT 2001, Vol. 2248, Lecture Notes in Computer Science, pp. 52--66, Springer-Verlag, 2001.
[10]
J. Katz, and J. Shin, "Parallel and Concurrent Security of the HB and HB++ Protocols", Advances in Cryptology -- EURO CRYPT 2006, Vol. 4004, Lecture Notes in Computer Science, pp. 73--87, Springer, 2006.
[11]
K. Fishkin, and S. Roy, "Enhancing RFID Privacy via Antenna Energy Analysis", MIT RFID Privacy Workshop, November 15, 2003, Boston, USA.
[12]
A. Juels, P. Syverson, and D. Bailey, "High-Power Proxies for Enhancing RFID Privacy and Utility", Workshop on Privacy Enhancing Technologies (PET), May 30-June 1, 2005, Dubrovnik, Croatia.
[13]
A. Juels, and S. Weis, "Defining Strong Privacy for RFID", Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 342--347, March 30, 2007, White Plains, NY, USA.
[14]
A. Juels, "Minimalist Cryptography for Low-cost RFID Tags," The Fourth International Conference on Security in Communication Networks, pp. 149--164, September 8-10, 2004, Amalfi, Italy.
[15]
J. Hillston, "A Compositional Approach to Performance Modeling," Ph.D. Thesis, University of Edinburgh, 1994.

Cited By

View all

Index Terms

  1. RFID survivability quantification and attack modeling

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '10: Proceedings of the third ACM conference on Wireless network security
      March 2010
      186 pages
      ISBN:9781605589237
      DOI:10.1145/1741866
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 March 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. adversary
      2. modeling
      3. quantification
      4. rfid
      5. survivability

      Qualifiers

      • Research-article

      Conference

      WISEC '10
      Sponsor:
      WISEC '10: Third ACM Conference on Wireless Network Security
      March 22 - 24, 2010
      New Jersey, Hoboken, USA

      Acceptance Rates

      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)Survivable RFID systemsIEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews10.1109/TSMCC.2010.204394940:4(406-418)Online publication date: 25-Dec-2018
      • (2016)Security and Trust Management for the Internet of Things: An Rfid and Sensor Network PerspectiveCyber‐Assurance for the Internet of Things10.1002/9781119193784.ch4(137-162)Online publication date: 17-Dec-2016
      • (2016)BibliographyCyber‐Assurance for the Internet of Things10.1002/9781119193784.biblio(433-455)Online publication date: 17-Dec-2016
      • (2012)A Server Independent Authentication Scheme for RFID SystemsIEEE Transactions on Industrial Informatics10.1109/TII.2012.21852458:3(689-696)Online publication date: Aug-2012

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media