{"title":"军事供应链中的RFID安全问题","authors":"Q. Xiao, Cam Boulet, T. Gibbons","doi":"10.1109/ARES.2007.127","DOIUrl":null,"url":null,"abstract":"Radio frequency identification (RFID) technologies have been used by the military to gain in-transit visibility and improve inventory management. The advantages of using RFID to track assets over using barcode have been broadly recognized. However, recent research has proven that RFID is vulnerable to attacks. This brings a challenge at a time when RFID systems are being employed in various applications, including military supply chain systems. In this paper, underlying vulnerabilities of RFID system are analyzed, different attacks that can be made against RFID system are illustrated, and countermeasures against the attacks are recommended. The objective of this article is to secure military logistics by identifying the common threats to RFID systems","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"40","resultStr":"{\"title\":\"RFID Security Issues in Military Supply Chains\",\"authors\":\"Q. Xiao, Cam Boulet, T. Gibbons\",\"doi\":\"10.1109/ARES.2007.127\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Radio frequency identification (RFID) technologies have been used by the military to gain in-transit visibility and improve inventory management. The advantages of using RFID to track assets over using barcode have been broadly recognized. However, recent research has proven that RFID is vulnerable to attacks. This brings a challenge at a time when RFID systems are being employed in various applications, including military supply chain systems. In this paper, underlying vulnerabilities of RFID system are analyzed, different attacks that can be made against RFID system are illustrated, and countermeasures against the attacks are recommended. The objective of this article is to secure military logistics by identifying the common threats to RFID systems\",\"PeriodicalId\":383015,\"journal\":{\"name\":\"The Second International Conference on Availability, Reliability and Security (ARES'07)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-04-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"40\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Second International Conference on Availability, Reliability and Security (ARES'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ARES.2007.127\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Second International Conference on Availability, Reliability and Security (ARES'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2007.127","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Radio frequency identification (RFID) technologies have been used by the military to gain in-transit visibility and improve inventory management. The advantages of using RFID to track assets over using barcode have been broadly recognized. However, recent research has proven that RFID is vulnerable to attacks. This brings a challenge at a time when RFID systems are being employed in various applications, including military supply chain systems. In this paper, underlying vulnerabilities of RFID system are analyzed, different attacks that can be made against RFID system are illustrated, and countermeasures against the attacks are recommended. The objective of this article is to secure military logistics by identifying the common threats to RFID systems