2008 IEEE International Conference on RFID 2008
DOI: 10.1109/rfid.2008.4519365
|View full text |Cite
|
Sign up to set email alerts
|

A Tamper Detection Method for RFID Tag Data

Abstract: Recently, system designers, especially in the field of product life-cycle management system start considering use of user memory bank of UHF RFID tags. By storing most useful life-cycle data onto a tag, user can access to the data even without access to back-end databases. One of the major issues to make use of the user memory bank is detection of memory tampering. Although technology vendors start introducing new functionalities such as fine grained locking along with high capacity user memory, these tags wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 5 publications
0
19
0
Order By: Relevance
“…Yamamoto et al [27] propose another means to watermark RFID tags. However, Gandino et al [8] observe that this method has several drawbacks including the requirement of large memory, long transmission time for tamper checking, and its limited applicability.…”
Section: Watermarking Rfid Tagsmentioning
confidence: 99%
“…Yamamoto et al [27] propose another means to watermark RFID tags. However, Gandino et al [8] observe that this method has several drawbacks including the requirement of large memory, long transmission time for tamper checking, and its limited applicability.…”
Section: Watermarking Rfid Tagsmentioning
confidence: 99%
“…On the other hand, watermarking approaches [13,18,19], write activity [15],stenography [11] fall on tamper evident and restoring category. The temper detection and restoring protocols can be further classified as protocols achieving temper detection only such as [12], [13], [14], [15] and protocols achieving both temper detection and recovery such as [11]. This point forward we will only discuss protocols on tamper evidence and restoring categories.…”
Section: Security Properties and Existing Workmentioning
confidence: 99%
“…It also did not consider the risk of tag's serial number tampering. Yamamoto et al, [15] proposed a tamper detection solution based on a technique known as digitally signed journal bit it requires modification in the existing EPC tags specification.…”
Section: Security Properties and Existing Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Park et al (2007), Yamamoto et al (2008), and Choi et al (2009) have proposed improvements to Gen2 authentication security or Gen2 anti-cloning security. They tried to keep the Gen2 air protocols unchanged, because there are many readers/writers deployed in the market.…”
Section: Introductionmentioning
confidence: 99%