RFID Exploitation and Countermeasures

09/30/2021
by   Luciano Gavoni, et al.
0

Radio Frequency Identification (RFID) systems are among the most widespread computing technologies with technical potential and profitable opportunities in numerous applications worldwide. Further, RFID is the core technology behind the Internet of Things (IoT), which can accomplish the real-time transmission of information between objects without manual operation. However, RFID security has been taken for granted for several years, causing multiple vulnerabilities that can even damage human functionalities. The latest ISO/IEC 18000-63:2015 standard concerning RFID dates to 2015, and much freedom has been given to manufacturers responsible for making their devices secure. The lack of a substantial standard for devices that implement RFID technology creates many vulnerabilities that expose end-users to elevated risk. Hence, this paper gives the reader a clear overview of the technology, and it analyzes 23 well-known RFID attacks such as Reverse Engineering, Buffer Overflow, Eavesdropping, and Malware. Moreover, given the exceptional capabilities and utilities of RFID devices, this paper has focused on security measures and defenses for protecting them, such as Active Jamming, Shielding tag, and Authentication.

READ FULL TEXT
research
05/31/2021

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist o...
research
09/21/2020

A Technical Review of Wireless security for the Internet of things: Software Defined Radio perspective

The increase of cyberattacks using IoT devices has exposed the vulnerabi...
research
03/28/2018

Custom RFID Location Simulator

Radio frequency identification (RFID), The real-time location of objects...
research
04/20/2020

Scalable and Secure Architecture for Distributed IoT Systems

Internet-of-things (IoT) is perpetually revolutionizing our daily life a...
research
03/26/2021

Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts

The lack of security measures among the Internet of Things (IoT) devices...
research
04/24/2019

Impersonating LoRaWAN gateways using Semtech Packet Forwarder

Low Power Wide Area Network (LPWAN) technologies like the Long Range Wid...
research
12/18/2022

From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem

Despite the numerous pompous statements regarding 5G, it is indisputable...

Please sign up or login with your details

Forgot password? Click here to reset