Practical Eavesdropping of Control Data From EPC Gen2 Queries With a Programmable RFID Toolkit

READ THE WHOLE ARTICLE

Like in many other emerging technologies, security threats can target the unprotected wireless channel used between RFID readers and tags to exchange information. We present a practical eavesdropping attack to capture control data exchanged between a standard EPC Gen2 reader and a series of EPC Gen2 tags. We assume that the attacker can only access to the spectrum channel that contains the set of queries generated by the reader, that is, the reader-to-tag channel. We show that, even if the security model of the EPC Gen2 standard allows to capture this data, it contains information generated by the on-board components of the tags, that shall remain secret to guarantee the security properties of an EPC Gen2 network. We base our attack on a programmable RFID toolkit, that silently captures and stores reader interrogations…

BY JOAQUIN GARCIA-ALFARO, JORDI HERRERA-JOANCOMARTI, JOAN MELIA-SEGUI

You must be logged in to post a comment