Abstract | ||
---|---|---|
Radio-Frequency Identification (RFID) is a wireless technology that already plays an important role in security-related applications. As soon as cryptographic features are integrated into RFID-enabled devices, the issue of implementation security becomes highly important. Implementation attacks exploit potential weaknesses of such devices and allow the extraction of sensitive information like secret keys. In this paper, we evaluate the efficiency of implementation attacks by conducting side-channel attacks and fault analysis on both High Frequency (HF) and Ultra-High Frequency (UHF) RFID tags. The results of our investigations disclose the potential vulnerability of RFID-tag implementations against practical attacks. Furthermore, this paper shows possible countermeasures that are optimised for resource-restricted devices like passive RFID tags. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1504/IJSN.2010.032209 | IJSN |
Keywords | Field | DocType |
rfid tag,ultra-high frequency,potential weakness,rfid device,important role,implementation security,implementation attack,high frequency,rfid-tag implementation,potential vulnerability,passive rfid tag,radio frequency identification,power analysis | Power analysis,Wireless,Cryptography,Computer security,Computer science,Exploit,Implementation,Information sensitivity,Radio-frequency identification,Ultra high frequency | Journal |
Volume | Issue | Citations |
5 | 2/3 | 8 |
PageRank | References | Authors |
0.44 | 13 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Michael Hutter | 1 | 345 | 25.26 |
Thomas Plos | 2 | 235 | 19.19 |
Martin Feldhofer | 3 | 301 | 22.92 |