Open access repository

Home Open access repository

In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).

» Openaccess proceedings » Eighth International Network Conference (INC 2010)

Eighth International Network Conference (INC 2010)

Eighth International Network Conference (INC 2010)
Heidelberg, Germany, July 6-8, 2010
ISBN: 978-1-84102-259-8

Title: Using the Generation One EPC RFID LockID Command as a Method of Directed Attack
Author(s): Christopher Mark Bolan
Reference: pp213-221
Keywords: RFID, Electronic Product Code, Deinal of Service
Abstract: An unlocked EPC tag allows for issuance of any command without the need for any authorisation with the exception aforementioned KILL command. This means that a system with unlocked tags would allow any attacker to modify tag data at will, whilst also opening the door to a range of other misuse. One possible avenue of active misuse against unlocked tags would be to issue LockID commands and ‘permanently’ lock some or all of a system‘s RFID tags. As this attack is simply an issuance of a valid command it fits firmly in the category of an active misuse and could also be considered a limited form of DoS as future valid commands would be ignored and limit or cripple the functionality of a system dependant on operation.
Download count: 1836

How to get this paper:

Download a free PDF copy of this paperBuy this book at Lulu.com

PDF copy of this paper is free to download. You may distribute this copy providing you cite this page as the source.