On the security of RFID devices against implementation attacks.
Michael HutterThomas PlosMartin FeldhoferPublished in: Int. J. Secur. Networks (2010)
Keyphrases
- rfid tags
- security problems
- security threats
- security protocols
- security mechanisms
- cyber attacks
- information security
- computer security
- rfid systems
- radio frequency identification rfid
- mobile devices
- security risks
- security measures
- security issues
- countermeasures
- data collection
- rfid reader
- malicious users
- malicious attacks
- cryptographic algorithms
- advanced encryption standard
- security breaches
- chosen plaintext
- rfid technology
- intrusion detection
- radio frequency identification
- security flaws
- secure routing
- access control
- buffer overflow
- supply chain management
- biometric template
- fault injection
- security vulnerabilities
- denial of service attacks
- java card
- security requirements
- resource constrained
- cryptographic protocols
- low cost