Issue No. 04 - October-December (2009 vol. 8)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MPRV.2009.68
Luke Mirowski , University of Tasmania
Jacqueline Hartnett , University of Tasmania
Raymond Williams , University of Tasmania
Radio frequency identification (RFID) uses electronic tags to produce information about entities in the real world. Security is important when the information is used to make decisions about high-value entities such as pharmaceuticals. The authors present a taxonomy of attacker behavior to show how attacks can be sequenced to invalidate the informational goals of RFID systems. The taxonomy can be used to understand the security requirements of RFID systems.
Network security, RFID, threat analysis
R. Williams, L. Mirowski and J. Hartnett, "An RFID Attacker Behavior Taxonomy," in IEEE Pervasive Computing, vol. 8, no. , pp. 79-84, 2009.