2015 International EURASIP Workshop on RFID Technology (EURFID) 2015
DOI: 10.1109/eurfid.2015.7332388
|View full text |Cite
|
Sign up to set email alerts
|

An effective intrusion detection approach for jamming attacks on RFID systems

Abstract: Private companies and government have decided to provide Radio Frequency Identification (RFID) systems in places of free access to the population. However, as a result of such exposition, these systems become vulnerable to Denial of Service (DoS) attacks that can cause unavailability in the services. Furthermore, another complicating factor in that context regards the equipment or devices used on RFID systems, since they operate in frequency bands reserved for secondary communication systems, and consequently … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…For example, Wang et al in [196] proposed an authentication scheme to cope with RFID replay attack. Avanco et al in [197] proposed a lowpower jamming detection mechanism in RFID networks. The proposed mechanism detects malicious activities within the network by exploiting side information such as the received signal power in adjacent channels, the received preamble, and the tag's uplink transmission response.…”
Section: Anti-jamming Techniquesmentioning
confidence: 99%
“…For example, Wang et al in [196] proposed an authentication scheme to cope with RFID replay attack. Avanco et al in [197] proposed a lowpower jamming detection mechanism in RFID networks. The proposed mechanism detects malicious activities within the network by exploiting side information such as the received signal power in adjacent channels, the received preamble, and the tag's uplink transmission response.…”
Section: Anti-jamming Techniquesmentioning
confidence: 99%
“…ISO/IEC 14443 consists of four parts: (1) physical characteristics, (2) RF power and signal interface, (3) initialization and anti-collision, and (4) transmission protocol. It also defines two kinds of tags (type A and type B), which differ in parts (2) and (3). Table 1 shows the differences in terms of modulation and coding between both types [in such a table, the reader is called proximity coupling device (PCD), and the tag is the proximity integrated circuit card (PICC)].…”
Section: Understanding the Underlying Protocolsmentioning
confidence: 99%
“…Fortunately, secure mechanisms can be applied to prevent the attacks aforementioned, including the use of cryptography, the automatic detection of rogue devices [3], the enhancement of the resistance to cloning [4], the secure storage of critical data in remote databases or the use of secure physical modulations and medium access control (MAC) protocols. Nonetheless, it is common to find commercial RFID systems that have such security features disabled or detect already-broken RFID security systems still in use.…”
Section: Introductionmentioning
confidence: 99%
“…Countermeasures can be taken to prevent attacks. The most common defenses include the use of cryptography [ 48 ], automatic malware detection [ 49 ], improving resistance to cloning [ 50 ], uncovering rogue devices [ 51 ], or the use of secure authentication schemes [ 52 ]. However, it is common to find commercial RFID systems that due to cost or speed have such security features disabled.…”
Section: Introductionmentioning
confidence: 99%