100 likes | 221 Views
Modeling Current RFID Threats and Security for Business Applications. James Johnston CS 498 4/2/2009. Previous Models. Linear Models Hierarchal Models. Garfinkel’s Model. Organized by whom is effected Abstract analysis, with lack of information on implimentation. Karygiannis ’ Model.
E N D
Modeling Current RFID Threats and Security for Business Applications James Johnston CS 498 4/2/2009
Previous Models Linear Models Hierarchal Models
Garfinkel’s Model Organized by whom is effected Abstract analysis, with lack of information on implimentation
Karygiannis’ Model Class based model Hard to understand for non-implimenter
Zhen-Hua’s Model Two level taxonomy Organized by location of threats Well structured but lacking some information
Objective Model for RFID Security Disruption attacks Integrity Attacks
Type of Attack Attacks Collision Replay Disruption Attacks Jamming RFID Threats Eavesdropping Cloning Integrity Attacks Spoofing Tracking Desynchronization Virus Taxonomy Model
Disruption Attacks • Collision Attack • Used with another ID • Simple to implement, easy to fix • Replay Attack • Used with one ID • Easy to prevent • RF Jamming Attack • Requires special equipment • Harder to prevent, can lead to bigger attacks
Integrity Attacks • Eavesdropping • Not exactly an attack • Leads into most attacks • Cloning • Moderate difficulty • Makes a complete copy • Pushes into Spoofing • Spoofing • Can be easy to implement • Defense is heavily based on the user • Tracking • Attack on Privacy • Implementation depends on user’s knowledge • Desynchronization • Difficult to implement • Invalidates tags • Virus • Limited memory on tag • Difficult to implement