Open Access Repository

Deckard: a system to detect change of RFID tag ownership


Downloads per month over past year

Mirowski, LT and Hartnett, J (2007) Deckard: a system to detect change of RFID tag ownership. International Journal of Computer Science and Network Security, 7 (7). pp. 89-98. ISSN 1738-7906

[img] PDF
Deckcard_a_Syst...pdf | Request a copy
Full text restricted
Available under University of Tasmania Standard License.


Change of tag ownership compromises the security goals of Radio Frequency Identification (RFID). When an attacker clones or steals an authorized subject’s tag, they are willingly granted access as RFID assumes the owner of a tag is always the authorized entity. We present Deckard, a new approach to preventing change of tag ownership. Deckard uses the principles of intrusion detection to look for anomalous behavior which may indicate a change of tag ownership has occurred. We have evaluated its performance in detecting synthesized attacks inside a sanitized RFID proximity tag audit log. The results suggest that intrusion detection systems can be used in RFID, although the weaknesses of statistical anomaly detection are also apparent when used on RFID data. We conclude with a call to further research of intrusion detection in RFID systems.

Item Type: Article
Authors/Creators:Mirowski, LT and Hartnett, J
Keywords: RFID,Intrusion Detection,Tag Cloning, Radio Frequency Identification,Computer Security
Journal or Publication Title: International Journal of Computer Science and Network Security
Page Range: pp. 89-98
ISSN: 1738-7906
Date Deposited: 28 Jan 2008 22:19
Last Modified: 18 Nov 2014 03:28
Item Statistics: View statistics for this item

Actions (login required)

Item Control Page Item Control Page