2009
DOI: 10.1109/mprv.2009.68
|View full text |Cite
|
Sign up to set email alerts
|

An RFID Attacker Behavior Taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…In order to extend this work and capture threats related to technical, physical and social engineering, we did a more thorough analysis of the conceptual design of the RFID-based goods management system, the physical layout of the warehouse where it is deployed and how people are involved in the work processes. We also made use of other relevant attack trees, such as Mirowski et al [Mirowski et al, 2009], to supplement the creation.…”
Section: An Rfid-based Goods Management Systemmentioning
confidence: 99%
“…In order to extend this work and capture threats related to technical, physical and social engineering, we did a more thorough analysis of the conceptual design of the RFID-based goods management system, the physical layout of the warehouse where it is deployed and how people are involved in the work processes. We also made use of other relevant attack trees, such as Mirowski et al [Mirowski et al, 2009], to supplement the creation.…”
Section: An Rfid-based Goods Management Systemmentioning
confidence: 99%
“…data reliability, read rate in critical conditions, lack of unified standard for interoperability), (ii) software weakness (Barchetti et al, 2010) (e.g. scalability, single-point of failure, integration with information systems), (iii) relatively high costs of tags, software customization and systems integration, (iv) security issues (Staake et al, 2005;Mirowski et al, 2009), (v) lack of scientific literature on the evaluation of potential effects of RFID exposure on molecular structure and potency of drugs (Acierno et al, 2010). There is a rich literature about developing and evaluating UHF RFID solutions.…”
Section: Related Workmentioning
confidence: 99%
“…(23). Some recent works (27) have focussed on this topic, exploiting diagnostic techniques such as high pressure liquid -Integration and interoperability of EPC network services with the information systems of organizations: EPC network architecture tries to standardize components and interfaces to serve as a basis for RFID-driven business. Currently, only the local components specified in the EPC network architecture are being used (24).…”
Section: Open Issuesmentioning
confidence: 99%