Open Access Open Access  Restricted Access Subscription Access

Security Analysis of RFID Relay Attacks

Sghaier Guizani,

Abstract


The recent practical deployment of radio frequency identification (RFID) technologies is becoming widespread in almost all kinds of wireless network-based applications. As anticipated, most of the applications based on sensor networks, ad-hoc and or mobile ad hoc networks (MANETs) can highly benefit from the adoption of RFID solutions. RFID tags store valuable information and can easily be subjected to unauthorized reading, tempering with and possible other uses, which can lead to many unknown activities. RFID tags are also vulnerable to different forms of relay attacks. In this article, we present a probabilistic approach to check and verify the flexibility of the RFID protocols against possible relay attacks, channels and application specific parameters are also considered in the analysis. Then we show how an attack can be avoided. Future work is presented at the conclusion.

Keywords


RFID; Security; Product code; Relay attacks; Intelligent systems

Citation Format:
Sghaier Guizani, "Security Analysis of RFID Relay Attacks," Journal of Internet Technology, vol. 17, no. 2 , pp. 191-196, Mar. 2016.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com