{"title":"基于移动读写器的限能RFID系统中人在和路由分流攻击","authors":"L. Galluccio, G. Morabito, Marco Catania","doi":"10.1109/Med-Hoc-Net.2011.5970494","DOIUrl":null,"url":null,"abstract":"Focus of this paper is a large RFID system, where mobile readers detect the presence of RFID tags in the surrounding and, periodically, report the outcome of such operation to a control center interested in localizing all RFID tags. In order to deliver the above reports to the control center, mobile readers establish a mobile ad hoc network. In this context, a possible objective of an attacker may be to make the system believe that the position of a certain RFID tag is different from the actual one. To achieve this, the attacker performs man-in-the-middle and routing diversion attacks. Solutions can be devised for combating such attacks but they involve increased energy consumption. In this paper the problem is stated and the tradeoff between security and energy efficiency discussed. Furthermore, some preliminary results are shown and analyzed.","PeriodicalId":350979,"journal":{"name":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","volume":"104 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Facing man-in-the-middle and route diversion attacks in energy-limited RFID systems based on mobile readers\",\"authors\":\"L. Galluccio, G. Morabito, Marco Catania\",\"doi\":\"10.1109/Med-Hoc-Net.2011.5970494\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Focus of this paper is a large RFID system, where mobile readers detect the presence of RFID tags in the surrounding and, periodically, report the outcome of such operation to a control center interested in localizing all RFID tags. In order to deliver the above reports to the control center, mobile readers establish a mobile ad hoc network. In this context, a possible objective of an attacker may be to make the system believe that the position of a certain RFID tag is different from the actual one. To achieve this, the attacker performs man-in-the-middle and routing diversion attacks. Solutions can be devised for combating such attacks but they involve increased energy consumption. In this paper the problem is stated and the tradeoff between security and energy efficiency discussed. Furthermore, some preliminary results are shown and analyzed.\",\"PeriodicalId\":350979,\"journal\":{\"name\":\"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop\",\"volume\":\"104 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Med-Hoc-Net.2011.5970494\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Med-Hoc-Net.2011.5970494","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Facing man-in-the-middle and route diversion attacks in energy-limited RFID systems based on mobile readers
Focus of this paper is a large RFID system, where mobile readers detect the presence of RFID tags in the surrounding and, periodically, report the outcome of such operation to a control center interested in localizing all RFID tags. In order to deliver the above reports to the control center, mobile readers establish a mobile ad hoc network. In this context, a possible objective of an attacker may be to make the system believe that the position of a certain RFID tag is different from the actual one. To achieve this, the attacker performs man-in-the-middle and routing diversion attacks. Solutions can be devised for combating such attacks but they involve increased energy consumption. In this paper the problem is stated and the tradeoff between security and energy efficiency discussed. Furthermore, some preliminary results are shown and analyzed.