16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

634 Chapter 24<br />

Figure 24.10 : E-ZPass high-speed toll plaza–antenna array<br />

24.8 Threat and Target Identification<br />

So far, we have learned how Radio Frequency Identification (RFID) works and how it<br />

is applied in both theory and real-world operations. This chapter discusses how security<br />

is implemented in RFID, and the possible attacks that can occur on RFID systems and<br />

applications.<br />

Before we can analyze possible attacks, we have to identify potential targets.<br />

A target can be an entire system (if the intent is to completely disrupt a business), or it<br />

can be any section of the overall system (from a retail inventory database to an actual<br />

retail item).<br />

Those involved in information technology security tend to concentrate solely on<br />

“ protecting the data. ” When evaluating and implementing security around RFID, it is<br />

important to remember that some physical assets are more important than the actual<br />

data. The data may never be affected, even though the organization could still suffer<br />

tremendous loss.<br />

Consider the following example in the retail sector. If an individual RFID tag was<br />

manipulated so that the price at the Point of Sale (POS) was reduced from $200.00 to<br />

$19.95, the store would suffer a 90 percent loss of the retail price, but with no damage to<br />

the inventory database system. The database was not directly attacked and the data in the<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!