Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    Recovering and restoring tampered RFID data using steganographic principles

    20139_downloaded_stream_127.pdf (538.8Kb)
    Access Status
    Open access
    Authors
    Mohan, M.
    Potdar, Vidyasagar
    Chang, Elizabeth
    Date
    2006
    Type
    Conference Paper
    
    Metadata
    Show full item record
    Citation
    Mohan, Madan and Potdar, Vidyasagar and Chang, Elizabeth. 2006. : Recovering and restoring tampered RFID data using steganographic principles, in Mohanty, S.P. and Sahoo, A. (ed), International Conference on Industrial Technology, Dec 15 2006, pp. 2853-2859. Mumbai, India: IEEE Computer Society Press.
    Source Title
    International Conference on Industrial Technology (ICIT 2006)
    Source Conference
    International Conference on Industrial Technology
    Faculty
    Curtin Business School
    School
    Centre for Extended Enterprises and Business Intelligence
    Remarks

    Copyright 2006 IEEE

    This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

    URI
    http://hdl.handle.net/20.500.11937/30814
    Collection
    • Curtin Research Publications
    Abstract

    Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try to solve the issue of data recovery after RFID data has been tampered. To address this issue, we present a novel steganographic solution, which embeds a secret pattern in the serial number partition of the RFID tag. This secret pattern is the data that we assume would most likely be the candidate for tampering, for example the manufacturer?s and products details stored on the RFID tag. The main motivation for an attacker to tamper this data would be economic benefits like low logistics cost, or quicker custom clearance, and this can only be achieved by changing product details or manufacturer details on the RFID tag. The novelty of this scheme lies in the fact that we have applied steganographic principles to RFID tags; in comparison, most of the existing steganographic solutions are limited to images, or audio, or video applications. We term this scheme ResTamp because it is restores tampered data. This paper provides a detailed theoretical foundation for the ResTamp algorithm.

    Related items

    Showing items related by title, author, creator and subject.

    • Tamper detection in RFID tags, using, fragile watermarking
      Potdar, Vidyasagar; Chang, Elizabeth (2006)
      Security and privacy are one of the two primary concerns with RFID (Radio Frequency Identification) adoption. While the mainstream RFID research is focused on solving the privacy issues, this paper focuses on security ...
    • Tamper detection for ubiquitous RFID-enabled supply chain
      Potdar, Vidyasagar; Wu, Chen; Chang, Elizabeth (2005)
      Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data ...
    • Automated Data Capture Technologies: RFID
      Potdar, Vidyasagar; Wu, Chen; Chang, Elizabeth (2007)
      In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.