首页> 外文期刊>International journal of information and computer security >Novel implementation of defence strategy of relay attack based on cloud in RFID systems
【24h】

Novel implementation of defence strategy of relay attack based on cloud in RFID systems

机译:RFID系统中基于云的中继攻击防御策略的新实现

获取原文
获取原文并翻译 | 示例

摘要

Radio frequency identification technology (RFID) is widely used in identity authentication and payment, and it also becomes an indispensable part of daily life. Cloud-based RFID systems have broad application prospects, and can be provided as a service to individuals or organisations. For example, RFID cards can be used for cash-less payment, physical access control, temporary rights and identification in cloud environment. When an RFID card is used, there is a wireless transaction between the card and its reader, which could be attacked by several methods, including a relay attack. Relay attacks are difficult to completely prevent and a serious threat to RFID systems security. An attacker could use limited resources to build up this kind of attack and may need little knowledge of the underlying protocol. In recent years, researchers have proposed solutions using second channels to resist relay attack, such as using environmental measurements including noise, light and temperature. This paper describes research on the defence techniques for relay attacks in cloudbased RFID systems. The cloud-based architecture for RFID systems typically consists of RFID tags, card readers (fixed or mobile) and cloud-based server functionality.
机译:射频识别技术(RFID)被广泛用于身份认证和支付,它也成为日常生活中不可或缺的一部分。基于云的RFID系统具有广阔的应用前景,并且可以作为服务提供给个人或组织。例如,RFID卡可用于无现金支付,物理访问控制,临时权限和云环境中的标识。使用RFID卡时,卡与读卡器之间存在无线事务,这可能会受到包括中继攻击在内的多种方法的攻击。中继攻击很难完全预防,并且严重威胁RFID系统的安全。攻击者可以使用有限的资源来建立这种攻击,并且可能几乎不需要底层协议的知识。近年来,研究人员提出了使用第二通道抵抗中继攻击的解决方案,例如使用包括噪声,光线和温度在内的环境测量。本文介绍了基于云的RFID系统中中继攻击防御技术的研究。 RFID系统的基于云的体系结构通常包括RFID标签,读卡器(固定或移动)和基于云的服务器功能。

著录项

  • 来源
  • 作者单位

    School of Computer Science and Technology/School of Software, Nanjing University of Posts and Telecommunications, Nanjing|Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing;

    School of Computer Science and Technology/School of Software, Nanjing University of Posts and Telecommunications, Nanjing|Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing;

    School of Computer Science and Technology/School of Software, Nanjing University of Posts and Telecommunications, Nanjing|Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing;

    Information Security Group, School of Mathematics and Information Security, Royal Holloway, University of London, Egham, Surrey;

    School of Computer Science and Technology/School of Software, Nanjing University of Posts and Telecommunications, Nanjing|Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing;

    School of Computer Science and Technology, School of Software, Nanjing University of Posts and Telecommunications, Nanjing;

    School of Computer Science and Technology, School of Software, Nanjing University of Posts and Telecommunications, Nanjing;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    relay attack; radio frequency identification technology; RFID systems; internet of things; NFC;

    机译:中继攻击射频识别技术RFID系统物联网NFC;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号