Ahmed F. Ashour, Calvin Condie, Cade Pocock, Steve C. Chiu, Andrew M. Chrysler, M. Fouda
{"title":"Spectrum-based Malware Detection for RFID Memory Banks in LF, HF, and UHF Bands","authors":"Ahmed F. Ashour, Calvin Condie, Cade Pocock, Steve C. Chiu, Andrew M. Chrysler, M. Fouda","doi":"10.1109/ORSS58323.2023.10161830","DOIUrl":null,"url":null,"abstract":"The use of Radio-Frequency Identification (RFID) technology has become increasingly prevalent in various industries due to its ability to track and manage inventory efficiently. However, there is always a chance of cybersecurity risks like malware attacks, just like with any other technology. To detect malware in low-frequency (LF), high-frequency (HF), and ultra-high-frequency (UHF) RFID tags, a method using spectrum monitoring of both regular and malware data in user memory banks has been proposed. The method involves the use of SQL interjection virus code simulated using MATLAB. The binary equivalent of the signal from the RFID tags is passed through a double-sideband amplitude shift keying (DSB-ASK) modulation system and then analyzed through spectrum analysis as frequency hopping takes place. By monitoring the power of each signal, the difference between the malware and normal signal data can be identified, with the malware causing a decrease in the original signal’s power by approximately 1 dB.","PeriodicalId":263086,"journal":{"name":"2023 IEEE International Opportunity Research Scholars Symposium (ORSS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Opportunity Research Scholars Symposium (ORSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ORSS58323.2023.10161830","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The use of Radio-Frequency Identification (RFID) technology has become increasingly prevalent in various industries due to its ability to track and manage inventory efficiently. However, there is always a chance of cybersecurity risks like malware attacks, just like with any other technology. To detect malware in low-frequency (LF), high-frequency (HF), and ultra-high-frequency (UHF) RFID tags, a method using spectrum monitoring of both regular and malware data in user memory banks has been proposed. The method involves the use of SQL interjection virus code simulated using MATLAB. The binary equivalent of the signal from the RFID tags is passed through a double-sideband amplitude shift keying (DSB-ASK) modulation system and then analyzed through spectrum analysis as frequency hopping takes place. By monitoring the power of each signal, the difference between the malware and normal signal data can be identified, with the malware causing a decrease in the original signal’s power by approximately 1 dB.