33
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

          Related collections

          Most cited references91

          • Record: found
          • Abstract: not found
          • Article: not found

          RFID Technology for IoT-Based Personal Healthcare in Smart Spaces

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Survey of automatic modulation classification techniques: classical approaches and new trends

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Radio frequency identification (RFID)

                Bookmark

                Author and article information

                Contributors
                Role: Academic Editor
                Role: Academic Editor
                Role: Academic Editor
                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                24 December 2016
                January 2017
                : 17
                : 1
                : 28
                Affiliations
                Department of Electronics and Systems, Faculty of Computer Science, Universidade da Coruña, 15071 A Coruña, Spain; paula.fraga@ 123456udc.es (P.F.-L.); m.albela@ 123456udc.es (M.S.-A.); luis.castedo@ 123456udc.es (L.C.)
                Author notes
                [* ]Correspondence: tiago.fernandez@ 123456udc.es ; Tel.: +34-981-16-7000 (ext. 6088)
                Article
                sensors-17-00028
                10.3390/s17010028
                5298601
                28029119
                66ed4f27-1792-4c83-ad3b-5389bfc50cdb
                © 2016 by the authors; licensee MDPI, Basel, Switzerland.

                This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 20 October 2016
                : 20 December 2016
                Categories
                Article

                Biomedical engineering
                rfid,iot,security,pentesting,iso/iec 14443,iso/iec 11784,iso/iec 11785,mifare
                Biomedical engineering
                rfid, iot, security, pentesting, iso/iec 14443, iso/iec 11784, iso/iec 11785, mifare

                Comments

                Comment on this article