Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality - Information Security Theory and Practice Access content directly
Conference Papers Year : 2015

Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality

Abstract

Radio frequency identification (RFID) is a core component of the Internet-of-Things. In certain cases the communication between the tag and the reader needs to be confidential. Some passive RFID tags have very limited computational power and can therefore not implement standard cryptographic mechanisms. This has led to several proposals where data sent by the RFID tag is ‘hidden’ by noisy signals generated by the RFID reader. The RFID reader can remove the noise but third-party adversaries cannot, thereby ensuring a confidential backward-channel for tag data without the need for cryptography. Although this is a promising research direction there are also some practical limitations on the effectiveness of such schemes. This paper shows that at least one recent scheme is vulnerable to data recovery despite varying the reader’s transmission power if there is a slight difference in the phase of the reader’s blocking signal and the tag’s data. We experimentally verify our attack and conclude that our eavesdropping and data recovery approach is effective and realistic. Finally we test three possible mitigation methods and show that two of the three approaches can provide protection against our attack while having little impact on the bit error rate of the reader in decoding the tag data.
Fichier principal
Vignette du fichier
978-3-319-24018-3_14_Chapter.pdf (486.74 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01442545 , version 1 (20-01-2017)

Licence

Attribution

Identifiers

Cite

Qiao Hu, Lavinia Mihaela Dinca, Gerhard Hancke. Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.219-234, ⟨10.1007/978-3-319-24018-3_14⟩. ⟨hal-01442545⟩
62 View
111 Download

Altmetric

Share

Gmail Facebook X LinkedIn More