Securing Deployed RFIDs by Randomizing the Modulation and the Channel
RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate reader can break their cryptographic protocol and obtain their secret keys. One...
Main Authors: | Wang, Jue, Hassanieh, Haitham, Katabi, Dina, Kohno, Tadayoshi |
---|---|
Other Authors: | Dina Katabi |
Published: |
2013
|
Online Access: | http://hdl.handle.net/1721.1/76260 |
Similar Items
-
Efficient and reliable low-power backscatter networks
by: Wang, Jue, et al.
Published: (2014) -
They can hear your heartbeats: non-invasive security for implantable medical devices
by: Gollakota, Shyamnath, et al.
Published: (2021) -
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices
by: Gollakota, Shyamnath, et al.
Published: (2012) -
D-BigBand: sensing GHZ-wide non-sparse spectrum on commodity radios
by: Shi, Lixin, et al.
Published: (2020) -
SourceSync: A Distributed Wireless Architecture for Exploiting Sender Diversity
by: Rahul, Hariharan Shankar, et al.
Published: (2012)