UNIT V
Classification of major security
attacks againt RFID systems
Physical Attack − The vulnerabilities in the implementation of larger level or transmission
protocols, which are represented in the manufacturing process of RFID can be used in
physical-layer attacks. One of the significant attacks which is categorized in physical-attacks
is traceability attack, which abuses the alteration in the manufacturing process of tags.
Spoofing Attack − In this method, false information which the system accepts is created
by an attacker. Some important information that can be altered in RFID networks including
MAC Address, IP, and domain name are used by an attacker.
Eavesdropping and Skimming Attack − One of the popular threats in each wireless
network is eavesdropping because of the feature of radio frequency, which can go
everywhere. An unauthorized user needs an antenna to data the communication between
the tag and reader in eavesdropping. An attacker can eavesdrop on both guidance reader-
to-tag and tag-to-reader.
Tag Cloning Attack − This attack can be appeared when the RFID tag is not secured by some
security policies. The tag’s ID and also the data that are saved within the tag can be copied by
an attacker and in such situations, some characteristic of RFID system is vulnerable to attacks.
Denial of Service − A Denial of Service attack is the wide term of an RFID system failure that
is related to an attack. These attacks are generally physical attacks like jamming the system
with noise interference, blocking radio signals, or even eliminating or disabling RFID tags.
landestine Tracking − The tag can emit a fixed bit series and the vehicle or person carrying
this tag, allowing clandestine physical tracking by advertising this value to readers. Some data
about the items that tag is connected to them can be advertising by the tag and allowing a
clandestine reader and collecting intended data about a person or a company.
Relay Attack − This attack can be counted as man-in-the-middle attack where a fake tag
attempt to connect with genuine reader and fooling the reader into thinking it is real card, and
the connection is correct. In this method, the protection electronic system is breached, and
genuine parties, remain unaware. This attack is more dangerous when cryptographic
algorithms are not executed on RFID tags.
Air drop
AirDrop is a feature on Apple devices that allows users to easily share
files, such as photos, videos, and documents, with other Apple devices
that are in close proximity. The concept behind AirDrop is to make file
sharing more convenient and efficient. It uses Bluetooth to discover
nearby devices and Wi-Fi to transfer the files. When you use AirDrop,
your device creates a peer-to-peer Wi-Fi network between the devices.
This means that the files are transferred directly from one device to
another, bypassing the need for a central server or internet connection.
To use AirDrop, both devices must have AirDrop turned on and be close
enough to each other for the devices to see each other. Once the
devices are in range, you can select the file you want to share and the
recipient's device will receive a notification asking if they want to
accept the file.