Skip to Main Content
RFID uses radio frequency signals to provide a no-contact and non-line-of-sight identification. In spite of its numerous advantages and implementations, it can also pose invasive new threats to rights, privacy of individuals, and security of organizations. A modified version of attack graph, a graph-based approach to network vulnerability analysis, is used in the threat modeling of an EPCglobal RFID system. The model can be used for the qualitative and quantitative assessment of the vulnerabilities and security attributes of the system.
Region 5 Technical Conference, 2007 IEEE
Date of Conference: 20-22 April 2007