Data Exfiltration via Multipurpose RFID Cards and Countermeasures

02/02/2019
by   Zheng Zhou, et al.
0

Radio-frequency identification(RFID) technology is widely applied in daily human life. The RFID cards are seen everywhere, from entrance guard to consumption. The information security of RFID cards, such as data confidentiality, tag anonymity, mutual authentication etc, has been fully studied. In the paper, using the RFID cards in MIFARE Classic and DESFire families, a bidirectional covert channel via multipurpose RFID cards between service providers is built to leak sensitive data between two simulation systems. Furthermore, by calculations and experiments, the daily channel capacity to leak data of the channel is obtained. Although the storage capacity of a single RFID card is very small, a large user base can still bring about a considerable amount to leak data. Then, the reasons for the existence of such channels are discussed. To eliminate this type of covert channels, a new authentication protocol between RFID cards and card readers are proposed. Our experimental results show a significant security improvement in prevention of such covert communications while keeping user convenience.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/19/2022

Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

Radio Frequency Identification (RFID) is a key technology used in many a...
research
11/19/2019

Two-Way Physical Layer Security Protocol for Gaussian Channels

In this paper we propose a two-way protocol of physical layer security u...
research
03/31/2020

A Lightweight Adaptable DNS Channel for Covert Data Transmission

Due to the vital role of security in online communications and this fact...
research
05/14/2018

AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments

Passwords are widely used for client to server authentication as well as...
research
12/16/2020

Group Handover for Drone-Mounted Base Stations

The widespread use of new technologies such as the Internet of things (I...
research
09/01/2022

SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface

The security goals of cloud providers and users include memory confident...
research
11/25/2019

CANTO – Covert AutheNtication with Timing channels over Optimized traffic flows for CAN

Previous research works have endorsed the use of delays and clock skews ...

Please sign up or login with your details

Forgot password? Click here to reset