Securing Deployed RFIDs by Randomizing the Modulation and the Channel

RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate reader can break their cryptographic protocol and obtain their secret keys. One...

Full description

Bibliographic Details
Main Authors: Wang, Jue, Hassanieh, Haitham, Katabi, Dina, Kohno, Tadayoshi
Other Authors: Dina Katabi
Published: 2013
Online Access:http://hdl.handle.net/1721.1/76260