By Topic

Technique for preventing DoS attacks on RFID systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Deepak Tagra ; Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia B3H 1W5, CANADA ; Musfiq Rahman ; Srinivas Sampalli

RFID systems are vulnerable to many types of malicious attacks, ranging from passive eavesdropping to complete denial of service (DoS). Hence it is becoming increasingly important to develop and design intrusion detection and prevention mechanisms for RFID. One of the ultra lightweight techniques to prevent DoS on RFID systems is the Gossamer protocol. In this paper, we show that although the Gossamer protocol is effective, it is vulnerable to one particular type of DoS, namely, DoS by de-synchronization. We further present a novel technique that extends the Gossamer protocol to prevent DoS attacks in general, and the de-synchronization DoS attack in particular. We validate our approach by a proof-of-concept simulation using a java framework.

Published in:

Software, Telecommunications and Computer Networks (SoftCOM), 2010 International Conference on

Date of Conference:

23-25 Sept. 2010