New security problem in RFID systems "Tag Killing"

Dong Guk Han, Tsuyoshi Takagi, Ho Won Kim, Kyo Il Chung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as "Tag Killing" which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with "Tag Killing" adversary model and we show that most of them have weaknesses and are vulnerable to it.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - ICCSA 2006
Subtitle of host publicationInternational Conference, Proceedings - Part III
PublisherSpringer Verlag
Pages375-384
Number of pages10
ISBN (Print)3540340750, 9783540340751
Publication statusPublished - Jan 1 2006
EventICCSA 2006: International Conference on Computational Science and Its Applications - Glasgow, United Kingdom
Duration: May 8 2006May 11 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3982 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherICCSA 2006: International Conference on Computational Science and Its Applications
CountryUnited Kingdom
CityGlasgow
Period5/8/065/11/06

Fingerprint

Radio Frequency Identification
Radio frequency identification (RFID)
Denial of Service
Privacy
Attack
Computing
Costs
Industry
Model

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Han, D. G., Takagi, T., Kim, H. W., & Chung, K. I. (2006). New security problem in RFID systems "Tag Killing". In Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III (pp. 375-384). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3982 LNCS). Springer Verlag.

New security problem in RFID systems "Tag Killing". / Han, Dong Guk; Takagi, Tsuyoshi; Kim, Ho Won; Chung, Kyo Il.

Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, 2006. p. 375-384 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3982 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Han, DG, Takagi, T, Kim, HW & Chung, KI 2006, New security problem in RFID systems "Tag Killing". in Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3982 LNCS, Springer Verlag, pp. 375-384, ICCSA 2006: International Conference on Computational Science and Its Applications, Glasgow, United Kingdom, 5/8/06.
Han DG, Takagi T, Kim HW, Chung KI. New security problem in RFID systems "Tag Killing". In Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag. 2006. p. 375-384. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Han, Dong Guk ; Takagi, Tsuyoshi ; Kim, Ho Won ; Chung, Kyo Il. / New security problem in RFID systems "Tag Killing". Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, 2006. pp. 375-384 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{fd967d3d5828471e9cf4c657df228f99,
title = "New security problem in RFID systems {"}Tag Killing{"}",
abstract = "Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as {"}Tag Killing{"} which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with {"}Tag Killing{"} adversary model and we show that most of them have weaknesses and are vulnerable to it.",
author = "Han, {Dong Guk} and Tsuyoshi Takagi and Kim, {Ho Won} and Chung, {Kyo Il}",
year = "2006",
month = "1",
day = "1",
language = "English",
isbn = "3540340750",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "375--384",
booktitle = "Computational Science and Its Applications - ICCSA 2006",
address = "Germany",

}

TY - GEN

T1 - New security problem in RFID systems "Tag Killing"

AU - Han, Dong Guk

AU - Takagi, Tsuyoshi

AU - Kim, Ho Won

AU - Chung, Kyo Il

PY - 2006/1/1

Y1 - 2006/1/1

N2 - Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as "Tag Killing" which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with "Tag Killing" adversary model and we show that most of them have weaknesses and are vulnerable to it.

AB - Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as "Tag Killing" which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with "Tag Killing" adversary model and we show that most of them have weaknesses and are vulnerable to it.

UR - http://www.scopus.com/inward/record.url?scp=33745926180&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745926180&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33745926180

SN - 3540340750

SN - 9783540340751

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 375

EP - 384

BT - Computational Science and Its Applications - ICCSA 2006

PB - Springer Verlag

ER -