New security problem in RFID systems "Tag Killing"

Dong Guk Han, Tsuyoshi Takagi, Ho Won Kim, Kyo Il Chung

研究成果: 著書/レポートタイプへの貢献会議での発言

12 引用 (Scopus)

抄録

Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as "Tag Killing" which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with "Tag Killing" adversary model and we show that most of them have weaknesses and are vulnerable to it.

元の言語英語
ホスト出版物のタイトルComputational Science and Its Applications - ICCSA 2006
ホスト出版物のサブタイトルInternational Conference, Proceedings - Part III
出版者Springer Verlag
ページ375-384
ページ数10
ISBN(印刷物)3540340750, 9783540340751
出版物ステータス出版済み - 1 1 2006
イベントICCSA 2006: International Conference on Computational Science and Its Applications - Glasgow, 英国
継続期間: 5 8 20065 11 2006

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
3982 LNCS
ISSN(印刷物)0302-9743
ISSN(電子版)1611-3349

その他

その他ICCSA 2006: International Conference on Computational Science and Its Applications
英国
Glasgow
期間5/8/065/11/06

Fingerprint

Radio Frequency Identification
Radio frequency identification (RFID)
Denial of Service
Privacy
Attack
Computing
Costs
Industry
Model

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

これを引用

Han, D. G., Takagi, T., Kim, H. W., & Chung, K. I. (2006). New security problem in RFID systems "Tag Killing". : Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III (pp. 375-384). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 3982 LNCS). Springer Verlag.

New security problem in RFID systems "Tag Killing". / Han, Dong Guk; Takagi, Tsuyoshi; Kim, Ho Won; Chung, Kyo Il.

Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, 2006. p. 375-384 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻 3982 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Han, DG, Takagi, T, Kim, HW & Chung, KI 2006, New security problem in RFID systems "Tag Killing". : Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 巻. 3982 LNCS, Springer Verlag, pp. 375-384, ICCSA 2006: International Conference on Computational Science and Its Applications, Glasgow, 英国, 5/8/06.
Han DG, Takagi T, Kim HW, Chung KI. New security problem in RFID systems "Tag Killing". : Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag. 2006. p. 375-384. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Han, Dong Guk ; Takagi, Tsuyoshi ; Kim, Ho Won ; Chung, Kyo Il. / New security problem in RFID systems "Tag Killing". Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, 2006. pp. 375-384 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{fd967d3d5828471e9cf4c657df228f99,
title = "New security problem in RFID systems {"}Tag Killing{"}",
abstract = "Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as {"}Tag Killing{"} which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with {"}Tag Killing{"} adversary model and we show that most of them have weaknesses and are vulnerable to it.",
author = "Han, {Dong Guk} and Tsuyoshi Takagi and Kim, {Ho Won} and Chung, {Kyo Il}",
year = "2006",
month = "1",
day = "1",
language = "English",
isbn = "3540340750",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "375--384",
booktitle = "Computational Science and Its Applications - ICCSA 2006",
address = "Germany",

}

TY - GEN

T1 - New security problem in RFID systems "Tag Killing"

AU - Han, Dong Guk

AU - Takagi, Tsuyoshi

AU - Kim, Ho Won

AU - Chung, Kyo Il

PY - 2006/1/1

Y1 - 2006/1/1

N2 - Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as "Tag Killing" which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with "Tag Killing" adversary model and we show that most of them have weaknesses and are vulnerable to it.

AB - Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Using cryptographic primitives to thwart RFID security problems is an approach which has been explored for several years. In this paper, we introduce a new security problem called as "Tag Killing" which aims to wipe out the functioning of the system, e.g., denial of service attacks. We analyze several well-known RFID protocols which are considered as good solutions with "Tag Killing" adversary model and we show that most of them have weaknesses and are vulnerable to it.

UR - http://www.scopus.com/inward/record.url?scp=33745926180&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745926180&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33745926180

SN - 3540340750

SN - 9783540340751

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 375

EP - 384

BT - Computational Science and Its Applications - ICCSA 2006

PB - Springer Verlag

ER -