Relay Attack in RFiD Systems Analysis and Modeling

Title: Relay Attack in RFiD Systems Analysis and Modeling
Authors: Lima, Jose Augusto
Date: 2011
Abstract: A relay attack on an RFiD system is carried out by a team of two attackers: one stationed near the victim, and using a rogue Reader to activate the victim's TAG; and another stationed near the legitimate Reader, using a high-speed communication system to relay the communication between the victim's TAG to the legitimate Reader through the attackers in real time. The relay attack is one of the most significant threats to the security of RFiD systems, because it is difficult to detect, is not thwarted by standard challenge-and-response security protocols and is independent of any cryptographic algorithms used to secure the RFiD communication. In this thesis, we present an analysis of the relay attack in an RFiD communication system, including an analysis of the many factors which limit the distance at which the attack may be carried out. A detailed Simulink model of an RFiD communication system was constructed in the IEEE14443 standard, and used to provide a simulation of the attack. The simulations show the feasibility of the relay attack. Finally, three relay attack countermeasures are proposed, together with an estimation of the probability of success for each.
CollectionTh├Ęses, 1910 - 2010 // Theses, 1910 - 2010
MR79708.PDF5.3 MBAdobe PDFOpen