Recovering and restoring tampered RFID data using steganographic principles
dc.contributor.author | Mohan, M. | |
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.author | Chang, Elizabeth | |
dc.date.accessioned | 2017-01-30T13:21:40Z | |
dc.date.available | 2017-01-30T13:21:40Z | |
dc.date.created | 2008-11-12T23:32:25Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Mohan, Madan and Potdar, Vidyasagar and Chang, Elizabeth. 2006. : Recovering and restoring tampered RFID data using steganographic principles, in Mohanty, S.P. and Sahoo, A. (ed), International Conference on Industrial Technology, Dec 15 2006, pp. 2853-2859. Mumbai, India: IEEE Computer Society Press. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/30814 | |
dc.description.abstract |
Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try to solve the issue of data recovery after RFID data has been tampered. To address this issue, we present a novel steganographic solution, which embeds a secret pattern in the serial number partition of the RFID tag. This secret pattern is the data that we assume would most likely be the candidate for tampering, for example the manufacturer?s and products details stored on the RFID tag. The main motivation for an attacker to tamper this data would be economic benefits like low logistics cost, or quicker custom clearance, and this can only be achieved by changing product details or manufacturer details on the RFID tag. The novelty of this scheme lies in the fact that we have applied steganographic principles to RFID tags; in comparison, most of the existing steganographic solutions are limited to images, or audio, or video applications. We term this scheme ResTamp because it is restores tampered data. This paper provides a detailed theoretical foundation for the ResTamp algorithm. | |
dc.publisher | IEEE Computer Society Press | |
dc.subject | ResTamp algorithm | |
dc.subject | RFID | |
dc.subject | RFID tags | |
dc.subject | privacy | |
dc.subject | steganographic principles | |
dc.subject | security | |
dc.subject | tampered RFID data | |
dc.subject | tampered | |
dc.subject | data recovery | |
dc.subject | recovering and restoring | |
dc.subject | steganographic | |
dc.subject | radio frequency identification | |
dc.title | Recovering and restoring tampered RFID data using steganographic principles | |
dc.type | Conference Paper | |
dcterms.source.startPage | 2853 | |
dcterms.source.endPage | 2859 | |
dcterms.source.title | International Conference on Industrial Technology (ICIT 2006) | |
dcterms.source.series | International Conference on Industrial Technology (ICIT 2006) | |
dcterms.source.conference | International Conference on Industrial Technology | |
dcterms.source.conference-start-date | Dec 15 2006 | |
dcterms.source.conferencelocation | Mumbai, India | |
dcterms.source.place | USA | |
curtin.note |
Copyright 2006 IEEE | |
curtin.note |
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-1270 | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School |