Análise de ataques em sistemas RFiD
(Analysis of Relay Attacks on RFiD Systems)
José Lima (email@example.com)1, A. Miri (firstname.lastname@example.org)2, M. Nevins (email@example.com)3
1STMicroeletronics2Ryerson University3University of Ottawa
This paper appears in: Revista IEEE América Latina
Publication Date: Jan. 2012
Volume: 10, Issue: 1
Today Radio Frequency identification RFiD systems are widely used in a variety of security sensitive applications such as access control, the payment industry and many others. An important class of attacks on these types of systems is that of relay attacks, due to the orthogonality of such attacks to the existing security and cryptographic solutions. In this paper we address the open question of the maximum distance between the rogue Reader and the victim TAG under which a relay attack can be successful. We determine that interference is the largest confounding factor, but that with proper interference cancelation, a distance of up to 10m is possible. This paper provides an analysis of the maximum distance for successful communication between the rogue Reader and the legitimate TAG,herein called the victim distance. We also propose several countermeasures to the relay attack.
Relay attacks, RFiD systems, Relay distance, Activation distance, Read range, Medium Access Controller (MAC)
Documents that cite this
This function is not implemented yet.
[PDF Full-Text (376)]