Show simple item record

Securing Deployed RFIDs by Randomizing the Modulation and the Channel

dc.date.accessioned2013-01-14T17:00:03Z
dc.date.accessioned2018-11-26T22:26:55Z
dc.date.available2013-01-14T17:00:03Z
dc.date.available2018-11-26T22:26:55Z
dc.date.issued2013-01-12
dc.identifier.urihttp://hdl.handle.net/1721.1/76260
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/76260
dc.description.abstractRFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate reader can break their cryptographic protocol and obtain their secret keys. One solution for this problem is to install stronger cryptographic protocols on the cards. However, RFIDs' size, power, and cost limitations do not allow for conventional cryptographic protocols. Further, installing new protocols requires revoking billions of cards in consumers hands and facilities worldwide, which is costly and impractical. In this paper, we ask whether one can secure RFIDs from such attacks without revoking or changing the insecure cards. We propose LocRF, a solution that changes the signal used to read the RFID cards but does not require any changes to the cards themselves. LocRF introduces a new approach that randomizes the modulation of the RFID signal as well as the wireless channel. This design protects RFIDs from eavesdroppers even if they use multi-antenna MIMO receivers. We built a prototype of LocRF on software-defined radios and used it to secure the communication of off-the-shelf cards. Both our analysis and empirical evaluation demonstrate theeffectiveness of LocRF.en_US
dc.format.extent15 p.en_US
dc.titleSecuring Deployed RFIDs by Randomizing the Modulation and the Channelen_US


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2013-001.pdf878.6Kbapplication/pdfView/Open

This item appears in the following Collection(s)

Show simple item record