Open Access Repository

Deckard: a system to detect change of RFID tag ownership


Downloads per month over past year

Mirowski, L ORCID: 0000-0002-1847-3848 and Hartnett, J 2007 , 'Deckard: a system to detect change of RFID tag ownership' , International Journal of Computer Science and Network Security, vol. 7, no. 7 , pp. 89-98 .

[img] PDF
Deckcard_a_Syst...pdf | Request a copy
Full text restricted
Available under University of Tasmania Standard License.


Change of tag ownership compromises the security goals of Radio Frequency Identification (RFID). When an attacker clones or steals an authorized subject’s tag, they are willingly granted access as RFID assumes the owner of a tag is always the authorized entity. We present Deckard, a new approach to preventing change of tag ownership. Deckard uses the principles of intrusion detection to look for anomalous behavior which may indicate a change of tag ownership has occurred. We have evaluated its performance in detecting synthesized attacks inside a sanitized RFID proximity tag audit log. The results suggest that intrusion detection systems can be used in RFID, although the weaknesses of statistical anomaly detection are also apparent when used on RFID data. We conclude with a call to further research of intrusion detection in RFID systems.

Item Type: Article
Authors/Creators:Mirowski, L and Hartnett, J
Keywords: RFID,Intrusion Detection,Tag Cloning, Radio Frequency Identification,Computer Security
Journal or Publication Title: International Journal of Computer Science and Network Security
ISSN: 1738-7906
Item Statistics: View statistics for this item

Actions (login required)

Item Control Page Item Control Page