Device Synchronisation : A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

4 Scopus Citations
View graph of relations

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationInformation Security Theory and Practice
Subtitle of host publication9th IFIP WG 11.2 International Conference, WISTP 2015, Proceedings
EditorsRaja Naeem Akram, Sushil Jajodia
PublisherSpringer Verlag
Pages219-234
ISBN (electronic)9783319240183
ISBN (print)9783319240176
Publication statusPublished - Aug 2015

Publication series

NameLecture Notes in Computer Science
Volume9311
ISSN (Print)0302-9743
ISSN (electronic)1611-3349

Conference

Title9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015)
PlaceGreece
CityHeraklion, Crete
Period24 - 25 August 2015

Abstract

Radio frequency identification (RFID) is a core component of the Internet-of-Things. In certain cases the communication between the tag and the reader needs to be confidential. Some passive RFID tags have very limited computational power and can therefore not implement standard cryptographic mechanisms. This has led to several proposals where data sent by the RFID tag is ‘hidden’ by noisy signals generated by the RFID reader. The RFID reader can remove the noise but third-party adversaries cannot, thereby ensuring a confidential backward-channel for tag data without the need for cryptography. Although this is a promising research direction there are also some practical limitations on the effectiveness of such schemes. This paper shows that at least one recent scheme is vulnerable to data recovery despite varying the reader’s transmission power if there is a slight difference in the phase of the reader’s blocking signal and the tag’s data. We experimentally verify our attack and conclude that our eavesdropping and data recovery approach is effective and realistic. Finally we test three possible mitigation methods and show that two of the three approaches can provide protection against our attack while having little impact on the bit error rate of the reader in decoding the tag data.

Research Area(s)

  • Eavesdropping, Jamming, Physical-layer security, RFID

Citation Format(s)

Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality. / Hu, Qiao; Dinca, Lavinia Mihaela; Hancke, Gerhard.
Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Proceedings. ed. / Raja Naeem Akram; Sushil Jajodia. Springer Verlag, 2015. p. 219-234 (Lecture Notes in Computer Science; Vol. 9311).

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review