In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
» Openaccess proceedings » Eighth International Network Conference (INC 2010)
Eighth International Network Conference (INC 2010)
Title: Using the Generation One EPC RFID LockID Command as a Method of Directed Attack
Author(s): Christopher Mark Bolan
Keywords: RFID, Electronic Product Code, Deinal of Service
Abstract: An unlocked EPC tag allows for issuance of any command without the need for any authorisation with the exception aforementioned KILL command. This means that a system with unlocked tags would allow any attacker to modify tag data at will, whilst also opening the door to a range of other misuse. One possible avenue of active misuse against unlocked tags would be to issue LockID commands and ‘permanently’ lock some or all of a system‘s RFID tags. As this attack is simply an issuance of a valid command it fits firmly in the category of an active misuse and could also be considered a limited form of DoS as future valid commands would be ignored and limit or cripple the functionality of a system dependant on operation.
Download count: 1399
How to get this paper:
PDF copy of this paper is free to download. You may distribute this copy providing you cite this page as the source.