studynotesandtheory

Open full view…

RFID Attacks!

Ahmed Khatib
Sun, 06 Nov 2016 15:03:49 GMT

*Quick note on RFID attacks* *Eavesdropping*(or Skimming) – Radio signals transmitted from the tag,and the reader, can be detected several meters away by other radio receivers. If legitimate transmissions are not properly protected, Individual who has their own RFID reader may interrogate tags and eavesdrop on tag contents. *Traffic Analysis*– Even if tag data is protected, it is possible to use traffic analysis tools to track predictable tag responses over time. Correlating and analyzing the data could build a picture of movement, social interactions, and financial transactions. Abuse of the traffic analysis would have a direct impact on privacy. *Spoofing* – Based on the data collected from eavesdropping or traffic analysis,it is possible to perform tag spoofing. The software permits intruders to overwrite existing RFID tag data with spoofed data. By spoofing valid tags, the intruder could fool an RFID system and change the identity of tags to gain an unauthorized or undetected advantage. *Denial of Service Attack*/Distributed Denial of Service Attack – A D oS on RFID infrastructure could happen if a large batch of tags has been corrupted. An attacker could use an illegal high power radio frequency (RF) transmitter in an attempt to jam frequencies used by the RFID system, bringing the whole system to a halt. *RFID Reader Integrity* – In some cases, RFID readers are installed in locations without adequate physical protection. Intruders may set up hidden readers of a similar nature nearby to gain access to the information being transmitted by the readers or even compromise the readers themselves,thus affecting their integrity. *Personal Privacy* RFID tags can be read without their consent if those tags comes under the proximity of RFID reader.which raises the concern of Identity theft.

vik0306
Tue, 15 Nov 2016 12:01:14 GMT

Nice read :)