Issue No. 04 - October-December (2009 vol. 8)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MPRV.2009.68
Raymond Williams , University of Tasmania
Luke Mirowski , University of Tasmania
Jacqueline Hartnett , University of Tasmania
Radio frequency identification (RFID) uses electronic tags to produce information about entities in the real world. Security is important when the information is used to make decisions about high-value entities such as pharmaceuticals. The authors present a taxonomy of attacker behavior to show how attacks can be sequenced to invalidate the informational goals of RFID systems. The taxonomy can be used to understand the security requirements of RFID systems.
Network security, RFID, threat analysis
Raymond Williams, Luke Mirowski, Jacqueline Hartnett, "An RFID Attacker Behavior Taxonomy", IEEE Pervasive Computing, vol. 8, no. , pp. 79-84, October-December 2009, doi:10.1109/MPRV.2009.68