76 research outputs found

    Hybrid approach to ensure data confidentiality and tampered data recovery for RFID tag

    Full text link
    Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although there are lots of work to provide privacy and anonymity, little focus has been given to ensure confidentiality and integrity of RFID tag data. To this end, we propose a lightweight hybrid approach based on stenographic and watermarking to ensure data confidentiality, linkability resistance and integrity on the RFID tags data. The proposed technique is capable of tampered data recovering and restoring for RFID tag. It has been validated and tested on EPC class 1 gen2 tags

    Tampering in RFID: A Survey on Risks and Defenses

    Get PDF
    RFID is a well-known pervasive technology, which provides promising opportunities for the implementation of new services and for the improvement of traditional ones. However, pervasive environments require strong efforts on all the aspects of information security. Notably, RFID passive tags are exposed to attacks, since strict limitations affect the security techniques for this technology. A critical threat for RFIDbased information systems is represented by data tampering, which corresponds to the malicious alteration of data recorded in the tag memory. The aim of this paper is to describe the characteristics and the effects of data tampering in RFID-based information systems, and to survey the approaches proposed by the research community to protect against it. The most important recent studies on privacy and security for RFID-based systems are examined, and the protection given against tampering is evaluated. This paper provides readers with an exhaustive overview on risks and defenses against data tampering, highlighting RFID weak spots and open issues

    Tamper detection in RFID tags, using, fragile watermarking

    Get PDF
    Security and privacy are one of the two primary concerns with RFID (Radio Frequency Identification) adoption. While the mainstream RFID research is focused on solving the privacy issues, this paper focuses on security issues in general and data tampering in particular. We specifically consider the issue of detecting data tampering on the RFID tags for applications such as data integrity management. To address this issue, we present a novel fragile watermarking scheme, which embeds a fragile watermark (or pattern) in the serial number partition of the RFID tag. This pattern is verified to identify whether or not the data on the RFID tags has been tampered with. The novelty of this watermarking scheme lies in the fact that we have applied watermarking technology to RFID tags; in comparison, most of the existing watermarking schemes are limited to images, or audio or video applications. We term this scheme TamDetect because it is a tamper detection solution. TamDetect is designed such that it can be easily plugged into existing RFID middleware applications. This proposal is one of the first works that integrates watermarking and RFID technologies together. This paper provides a detailed theoretical foundation for the TamDetect solution

    Tamper detection in the EPC network using digital watermarking

    Get PDF

    Tamper detection in RFID-enabled supply chains using fragile watermarking

    Get PDF
    While mainstream RFID research has been focused on solving privacy issues, security in general and data tampering in specific is still an open question. This paper analyzes potential security threats especially data tampering in RFID-enabled supply chains and proposes solutions how these threats might be addressed using fragile watermarking technologies. We first survey RFID system and its security problems, and then explain the importance of fragile watermarking schemes for RFID systems and possible applications using fragile watermarking to detect and locate any modification in RFID systems. Finally we suggest possible solutions using fragile watermarking for RFID-enabled supply chain

    Tamper Detection in the EPC Network Using Digital Watermarking

    Get PDF
    National Science Foundation of China [70971112, 70902042

    SECURITY ISSUES IN INTERNET OF THINGS (IOT) RELATED TO PASSIVE RFID TAGS

    Get PDF
    According to the latest research of emerging technologies in the next few decades, an era of fully integrated Future Internet is coming. The Internet of Things (IoT) paradigm will be the one of the leading technologies in the transformation from nowadays Internet into the Future Internet. Many European projects related to IoT were announced this year, such as Horizon 2020. In definition, IoT includes smart objects, machine to machine (M2M) communication, radio frequency (RF) technologies, and a central hub of information. One of the major requirements for IoT is that objects must have a unique identity, which would make them practically addressable when exchanging information. To achieve that, RFID tags can be used. There are three types of RFID tags: active, semi-passive, and passive. Considering their basic characteristics, passive tags are the most suitable to use in IoT. Passive RFID tags can have certain security issues. In this paper, using the STRIDE threat model, potential issues of passive RFID tags are described and discussed, with the currently known guidelines for their elimination

    Recovering and restoring tampered RFID data using steganographic principles

    Get PDF
    Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try to solve the issue of data recovery after RFID data has been tampered. To address this issue, we present a novel steganographic solution, which embeds a secret pattern in the serial number partition of the RFID tag. This secret pattern is the data that we assume would most likely be the candidate for tampering, for example the manufacturer?s and products details stored on the RFID tag. The main motivation for an attacker to tamper this data would be economic benefits like low logistics cost, or quicker custom clearance, and this can only be achieved by changing product details or manufacturer details on the RFID tag. The novelty of this scheme lies in the fact that we have applied steganographic principles to RFID tags; in comparison, most of the existing steganographic solutions are limited to images, or audio, or video applications. We term this scheme ResTamp because it is restores tampered data. This paper provides a detailed theoretical foundation for the ResTamp algorithm

    Applications for RFID in pharmaceutical industry

    Get PDF
    Security and safety are two important features desired in pharmaceutical supply chain and achieving the same is a challenging task. The need to secure and authenticate pharmaceutical products has increased tremendously with the emerging counterfeit product market. The motivation to introduce counterfeit pharmaceutical products in the supply chain could be to gain rapid economic benefits or affecting the reputation of strong brand in the pharmaceutical industry. RFID technology can be used to deter counterfeiting attempts. It can also be used in various other domains in the pharmaceutical industry. The main aim of this paper is to outline all the applications of RFID in the pharmaceutical industry. After explaining the main applications, we discuss how information hiding techniques could be used with RFID to offer efficient expiry date management, pharmaceutical tamper detection, and fraud detection and prevention
    corecore