modeling current rfid threats and security for business applications n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Modeling Current RFID Threats and Security for Business Applications PowerPoint Presentation
Download Presentation
Modeling Current RFID Threats and Security for Business Applications

Loading in 2 Seconds...

play fullscreen
1 / 10

Modeling Current RFID Threats and Security for Business Applications - PowerPoint PPT Presentation


  • 104 Views
  • Uploaded on

Modeling Current RFID Threats and Security for Business Applications. James Johnston CS 498 4/2/2009. Previous Models. Linear Models Hierarchal Models. Garfinkel’s Model. Organized by whom is effected Abstract analysis, with lack of information on implimentation. Karygiannis ’ Model.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Modeling Current RFID Threats and Security for Business Applications' - ursula


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
modeling current rfid threats and security for business applications

Modeling Current RFID Threats and Security for Business Applications

James Johnston

CS 498

4/2/2009

previous models
Previous Models

Linear Models

Hierarchal Models

garfinkel s model
Garfinkel’s Model

Organized by whom is effected

Abstract analysis, with lack of information on implimentation

karygiannis model
Karygiannis’ Model

Class based model

Hard to understand for non-implimenter

zhen hua s model
Zhen-Hua’s Model

Two level taxonomy

Organized by location of threats

Well structured but lacking some information

objective model for rfid security
Objective Model for RFID Security

Disruption attacks

Integrity Attacks

taxonomy model

Type of Attack

Attacks

Collision

Replay

Disruption Attacks

Jamming

RFID Threats

Eavesdropping

Cloning

Integrity Attacks

Spoofing

Tracking

Desynchronization

Virus

Taxonomy Model
disruption attacks
Disruption Attacks
  • Collision Attack
    • Used with another ID
    • Simple to implement, easy to fix
  • Replay Attack
    • Used with one ID
    • Easy to prevent
  • RF Jamming Attack
    • Requires special equipment
    • Harder to prevent, can lead to bigger attacks
integrity attacks
Integrity Attacks
  • Eavesdropping
    • Not exactly an attack
    • Leads into most attacks
  • Cloning
    • Moderate difficulty
    • Makes a complete copy
    • Pushes into Spoofing
  • Spoofing
    • Can be easy to implement
    • Defense is heavily based on the user
  • Tracking
    • Attack on Privacy
    • Implementation depends on user’s knowledge
  • Desynchronization
    • Difficult to implement
    • Invalidates tags
  • Virus
    • Limited memory on tag
    • Difficult to implement