Recovering and restoring tampered RFID data using steganographic principles
MetadataShow full item record
Copyright 2006 IEEE
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try to solve the issue of data recovery after RFID data has been tampered. To address this issue, we present a novel steganographic solution, which embeds a secret pattern in the serial number partition of the RFID tag. This secret pattern is the data that we assume would most likely be the candidate for tampering, for example the manufacturer?s and products details stored on the RFID tag. The main motivation for an attacker to tamper this data would be economic benefits like low logistics cost, or quicker custom clearance, and this can only be achieved by changing product details or manufacturer details on the RFID tag. The novelty of this scheme lies in the fact that we have applied steganographic principles to RFID tags; in comparison, most of the existing steganographic solutions are limited to images, or audio, or video applications. We term this scheme ResTamp because it is restores tampered data. This paper provides a detailed theoretical foundation for the ResTamp algorithm.
Showing items related by title, author, creator and subject.
Potdar, Vidyasagar; Chang, Elizabeth (2006)Security and privacy are one of the two primary concerns with RFID (Radio Frequency Identification) adoption. While the mainstream RFID research is focused on solving the privacy issues, this paper focuses on security ...
Potdar, Vidyasagar; Wu, Chen; Chang, Elizabeth (2005)Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data ...
Potdar, Vidyasagar; Wu, Chen; Chang, Elizabeth (2007)In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification ...