Download PDF (external access)

13th International Workshop on Security Protocols, Date: 2005/04/20 - 2005/04/22, Location: Cambridge: ENGLAND

Publication date: 2007-01-01
Volume: 4631 Pages: 51 - 59
ISSN: 978-3-540-77155-5
Publisher: Springer; BERLIN

Lecture Notes in Computer Science

Author:

Rieback, Melanie R
Crispo, Bruno ; Tanenbaum, Andrew S ; Christianson, B ; Crispo, B ; Malcolm, JA ; Roe, M

Keywords:

Science & Technology, Technology, Computer Science, Theory & Methods, Computer Science, SYSTEMS

Abstract:

This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible. © Springer-Verlag Berlin Heidelberg 2007.