{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:56:55Z","timestamp":1742392615749},"reference-count":66,"publisher":"Wiley","issue":"12","license":[{"start":{"date-parts":[[2011,12,22]],"date-time":"2011-12-22T00:00:00Z","timestamp":1324512000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2014,12]]},"abstract":"ABSTRACT<\/jats:title>Radio frequency identification (RFID) systems are becoming increasingly ubiquitous in both public and private domains. However, because of the inherent weaknesses of underlying wireless radio communications, RFID systems are plagued with a wide variety of security and privacy threats. A large number of these threats arise because of the tag's promiscuous response to any reader requests. This renders sensitive tag information easily subject to unauthorized reading<\/jats:italic>. Promiscuous tag response also incites different forms of relay attacks<\/jats:italic> whereby a malicious colluding pair, relaying messages between a tag and a reader, can successfully impersonate the tag without actually possessing it. Because of the increasing ubiquity of RFID devices, there is a pressing need for the development of security primitives and protocols to defeat unauthorized reading and relay attacks. However, currently deployed or proposed solutions often fail to satisfy the constraints and requirements of the underlying RFID applications in terms of (one or more of) efficiency, security, and usability. This paper proposes a novel research direction, one that utilizes sensing technologies, to tackle the problems of unauthorized reading and relay attacks with a goal of reconciling the requirements of efficiency, security, and usability. The premise of the proposed work is based on a current technological advancement that enables many RFID tags with low\u2010cost sensing capabilities. The on\u2010board tag sensors will be used to acquire useful contextual information about the tag's environment (or its owner, or the tag itself). For defense against unauthorized reading and relay attacks, such context information can be leveraged in two ways. First, contextual information can be used to design context\u2010aware selective unlocking<\/jats:italic> mechanisms so that tags can selectively respond to reader interrogations and thus minimize the likelihood of unauthorized reading and \u201cghost\u2010and\u2010leech\u201d relay attacks. Second, contextual information can be used as a basis for context\u2010aware secure transaction verification<\/jats:italic> to defend against special types of relay attacks involving malicious readers. Copyright \u00a9 2011 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.404","type":"journal-article","created":{"date-parts":[[2011,12,22]],"date-time":"2011-12-22T20:09:33Z","timestamp":1324584573000},"page":"2684-2695","source":"Crossref","is-referenced-by-count":15,"title":["A context\u2010aware approach to defend against unauthorized reading and relay attacks in RFID systems"],"prefix":"10.1002","volume":"7","author":[{"given":"Di","family":"Ma","sequence":"first","affiliation":[{"name":"University of Michigan\u2010Dearborn Computer and Information Science 4901 Evergreen Road Dearborn MI 48128 U.S.A."}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"University of Alabama, Birmingham Computer and Information Sciences 1300 University Blvd. Birmingham AL 35294 U.S.A."}]}],"member":"311","published-online":{"date-parts":[[2011,12,22]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"EPIC.ORG.Wal\u2010Mart begins tagging and tracking merchandise with RFID. Available online athttp:\/\/epic.org\/2010\/07\/wal\u2010mart\u2010begins\u2010tagging\u2010and\u2010tr.htmlJuly2010."},{"key":"e_1_2_7_3_1","unstructured":"US Department of State.The US electronic passport. Available online athttp:\/\/travel.state.gov\/passport\/passport_2498.html"},{"key":"e_1_2_7_4_1","unstructured":"EMVCo.About EMV. Available online athttp:\/\/www.emvco.com\/about_emv.aspxNovember2009."},{"key":"e_1_2_7_5_1","unstructured":"Washington State Department of Licensing.Enhanced driver license\/ID card. Available online athttp:\/\/www.dol.wa.gov\/about\/news\/priorities\/edl.html"},{"key":"e_1_2_7_6_1","unstructured":"NYS DMV.Enhanced driver licenses and non\u2010driver identification cards. Available online athttp:\/\/www.nydmv.state.ny.us\/broch\/C158.pdfJuly2010."},{"key":"e_1_2_7_7_1","unstructured":"FrancillonA DanevB CapkunS.Relay attacks on passive keyless entry and start systems in modern cars.18th Annual Network and Distributed System Security Symposium(NDSS) 2011."},{"key":"e_1_2_7_8_1","unstructured":"IT Global Consulting Ltd.RFID toll road payment. Available online athttp:\/\/www.itglobalconsulting.com\/rfidtollroadpayment.asp."},{"key":"e_1_2_7_9_1","unstructured":"Infowars.com.Texas Department of Transportation to instate RFID TxTag. Available online athttp:\/\/www.infowars.com\/articles\/bb\/toll_roads_tx_tag.htmSeptember2005."},{"key":"e_1_2_7_10_1","unstructured":"RFID Asia.New Ez\u2010Link contactless smart cards converge transit and payment applications. Available online athttp:\/\/journal.rfid\u2010asia.info\/2008\/12\/new\u2010ez\u2010link\u2010contactless\u2010smart\u2010cards.htmDecember2008."},{"key":"e_1_2_7_11_1","unstructured":"Medical News Today.VeriChip Corporation announces phase II development of in vivo glucose\u2010sensing RFID microchip with RECEPTORS LLC. Available online athttp:\/\/www.medicalnewstoday.com\/articles\/165894.phpOctober2009."},{"key":"e_1_2_7_12_1","unstructured":"JuelsA MolnarD WagnerD.Security and privacy issues in E\u2010passports.Security and Privacy for Emerging Areas in Communications Networks(SecureComm) 2005."},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"e_1_2_7_14_1","article-title":"Vulnerabilities in first\u2010generation RFID\u2010enabled credit cards","author":"Heydt\u2010Benjamin TS","year":"2007","journal-title":"Eleventh International Conference on Financial Cryptography (FC)"},{"key":"e_1_2_7_15_1","unstructured":"KfirZ WoolA.Picking virtual pockets using relay attacks on contactless smartcard.Security and Privacy for Emerging Areas in Communications Networks(SecureComm) 2005."},{"key":"e_1_2_7_16_1","unstructured":"DrimerS MurdochSJ.Keep your enemies close: distance bounding against smartcard relay attacks.16th USENIX Security Symposium 2007."},{"key":"e_1_2_7_17_1","unstructured":"OrenY WoolA.Relay attacks on RFID\u2010based electronic voting systems.Cryptology ePrint Archive Report 2009\/422. Available online athttp:\/\/eprint.iacr.org\/2009\/4222009."},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","unstructured":"JuelsA RivestRL SzydloM.The blocker tag: selective blocking of RFID tags for consumer privacy.ACM Conference on Computer and Communications Security(CCS) 2003.","DOI":"10.1145\/948109.948126"},{"key":"e_1_2_7_19_1","doi-asserted-by":"crossref","unstructured":"JuelsA SyversonPF BaileyDV.High\u2010power proxies for enhancing RFID privacy and utility.Privacy Enhancing Technologies 2005.","DOI":"10.1007\/11767831_14"},{"key":"e_1_2_7_20_1","doi-asserted-by":"crossref","unstructured":"RiebackMR CrispoB TanenbaumAS.RFID guardian: a battery\u2010powered mobile device for RFID privacy management.Australasian Conference on Information Security and Privacy(ACISP) 2005.","DOI":"10.1007\/11506157_16"},{"key":"e_1_2_7_21_1","doi-asserted-by":"crossref","unstructured":"KoscherK JuelsA BrajkovicV KohnoT.EPC RFID tag security weaknesses and defenses: passport cards enhanced drivers licenses and beyond.ACM Conference on Computer and Communications Security 2009.","DOI":"10.1145\/1653662.1653668"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"e_1_2_7_23_1","doi-asserted-by":"crossref","unstructured":"JuelsA WeisS.Authenticating pervasive devices with human protocols.International Cryptology Conference(CRYPTO) 2005.","DOI":"10.1007\/11535218_18"},{"key":"e_1_2_7_24_1","unstructured":"BringerJ ChabanneH DottaxE.HB++: a lightweight authentication protocol secure against some attacks.Security Privacy and Trust in Pervasive and Ubiquitous Computing 2006."},{"key":"e_1_2_7_25_1","doi-asserted-by":"crossref","unstructured":"KatzJ ShinJ.Parallel and concurrent security of the HB and HB+ protocols.Advances in Cryptology\u2014EUROCRYPT International Conference on the Theory and Applications of Cryptographic Techniques 2006.","DOI":"10.1007\/11761679_6"},{"key":"e_1_2_7_26_1","unstructured":"GilbertH RobshawM SeurinY.HB#: increasing the security and efficiency of HB+.Advances in Cryptology\u2014EUROCRYPT International Conference on the Theory and Applications of Cryptographic Techniques 2008."},{"key":"e_1_2_7_27_1","unstructured":"BrandsS ChaumD.Distance\u2010bounding protocols.Advances in Cryptology\u2014EUROCRYPT International Conference on the Theory and Applications of Cryptographic Techniques 1993."},{"key":"e_1_2_7_28_1","unstructured":"HanckeGP KuhnMG.An RFID distance bounding protocol.Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks 2005."},{"key":"e_1_2_7_29_1","unstructured":"RasmussenKB \u010capkunS.Realization of RF distance bounding.Proceedings of the USENIX Security Symposium 2010."},{"key":"e_1_2_7_30_1","unstructured":"RuhanenA et al.Sensor\u2010enabled RFID tag handbook. Available online athttp:\/\/www.bridge\u2010project.eu\/data\/File\/BRIDGE_WP01_RFID_tag_handbook.pdfJanuary2008."},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIOCAS.2008.4696868"},{"key":"e_1_2_7_32_1","doi-asserted-by":"crossref","unstructured":"SampleA YeagerDJ SmithJR.A capacitive touch interface for passive RFID tags.IEEE International Conference on RFID2009.","DOI":"10.1109\/RFID.2009.4911212"},{"key":"e_1_2_7_33_1","doi-asserted-by":"crossref","unstructured":"SampleA YeagerD PowledgeP SmithJ.Design of a passively\u2010powered programmable sensing platform for UHF RFID systems.IEEE International Conference on RFID 2007.","DOI":"10.1109\/RFID.2007.346163"},{"key":"e_1_2_7_34_1","doi-asserted-by":"crossref","unstructured":"SmithJR PowledgePS RoyS MamishevA.A wirelessly\u2010powered platform for sensing and computation.8th International Conference on Ubiquitous Computing(UbiComp) 2006.","DOI":"10.1007\/11853565_29"},{"key":"e_1_2_7_35_1","unstructured":"BuettnerM GreensteinB SampleA SmithJR WetherallD.Revisiting smart dust with RFID sensor networks.ACM Workshop on Hot Topics in Networks(Hotnets\u2010VII) 2008."},{"key":"e_1_2_7_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5181898"},{"key":"e_1_2_7_37_1","doi-asserted-by":"crossref","unstructured":"CzeskisA KoscherK SmithJ KohnoT.RFIDs and secret handshakes: defending against ghost\u2010and\u2010leech attacks and unauthorized reads with context\u2010aware communications.ACM Conference on Computer and Communications Security 2008.","DOI":"10.1145\/1455770.1455831"},{"key":"e_1_2_7_38_1","unstructured":"WagnerD.Privacy in pervasive computing: what can technologists do?Invited talk SECURECOMM 2005. Available online athttp:\/\/www.cs.berkeley.edu\/daw\/talks\/SECCOM05.pptSeptember2005."},{"key":"e_1_2_7_39_1","doi-asserted-by":"crossref","unstructured":"BuettnerM PrasadR PhiliposeM WetherallD.Recognizing daily activities with RFID\u2010based sensors.International Conference on Ubiquitous Computing(UbiComp) 2009.","DOI":"10.1145\/1620545.1620553"},{"key":"e_1_2_7_40_1","unstructured":"WISP Wiki.http:\/\/wisp.wikispaces.com"},{"key":"e_1_2_7_41_1","doi-asserted-by":"crossref","unstructured":"YeagerD PrasadR WetherallD PowledgeP SmithJ.Wirelessly\u2010charged UHF tags for sensor data collection.IEEE International Conference on RFID 2008.","DOI":"10.1109\/RFID.2008.4519381"},{"key":"e_1_2_7_42_1","article-title":"NeuralWISP: A Wirelessly\u2010Powered Neural Interface with 1\u2010m Range","author":"Yeager D","journal-title":"To appear in IEEE Transactions on Biomedical Circuits and Systems"},{"key":"e_1_2_7_43_1","doi-asserted-by":"crossref","unstructured":"HalperinD Heydt\u2010BenjaminTS RansfordB ClarkSS DefendB MorganW FuK KohnoT MaiselWH.Pacemakers and implantable cardiac defibrillators: software radio attacks and zero\u2010power defenses.IEEE Symposium on Security and Privacy 2008.","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_2_7_44_1","unstructured":"Honeywell.1 2 and 3 axis magnetic sensors. Available online athttp:\/\/www51.honeywell.com\/aero\/common\/documents\/myaerospacecatalog\u2010documents\/Defense_Brochures\u2010documents\/HMC_1051\u20101052\u20101053_Data_Sheet.pdf"},{"key":"e_1_2_7_45_1","unstructured":"Servoflo Corporation.New micro altimeter ms5607 for barometric pressure measurement. Available online athttp:\/\/www.servoflo.com\/news\/295\u2010new\u20105607\u2010barometric\u2010pressure\u2010sensor.html"},{"key":"e_1_2_7_46_1","unstructured":"ST.com.MP34DB01 MEMS audio sensor omnidirectional digital microphone. Available online athttp:\/\/www.st.com\/internet\/com\/TECHNICAL_RESOURCES\/TECHNICAL_LITERATURE\/DATASHEET\/CD00284650.pdfApril2011."},{"key":"e_1_2_7_47_1","unstructured":"SalajeghehM ClarkS RansfordB FuK JuelsA.CCCP: secure remote storage for computational RFIDs.18th USENIX Security Symposium 2009; August."},{"key":"e_1_2_7_48_1","doi-asserted-by":"crossref","unstructured":"SmithJR SampleAP PowledgePS RoyS MamishevA.A wirelessly\u2010powered platform for sensing and computation.Proceedings of UbiComp 2006 2006.","DOI":"10.1007\/11853565_29"},{"key":"e_1_2_7_49_1","doi-asserted-by":"crossref","unstructured":"SaxenaN VorisJ.Still and silent: motion detection for enhanced RFID security and privacy without changing the usage model.Workshop on RFID Security(RFIDSec) 2010.","DOI":"10.1007\/978-3-642-16822-2_2"},{"key":"e_1_2_7_50_1","volume-title":"Introduction to Electrodynamics","author":"Griffiths DJ","year":"1999"},{"key":"e_1_2_7_51_1","unstructured":"BourzacK.TR10: atomic magnetometers. Available online athttp:\/\/www.technologyreview.com\/biotech\/20239\/April2008."},{"key":"e_1_2_7_52_1","doi-asserted-by":"crossref","unstructured":"HuygheB DoutreloigneJ.3D orientation tracking based on unscented Kalman filtering of accelerometer and magnetometer data.IEEE Sensors Application Symposium 2009.","DOI":"10.1109\/SAS.2009.4801796"},{"key":"e_1_2_7_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.911646"},{"key":"e_1_2_7_54_1","unstructured":"Goldiron.Numerex unveils hybrid tag includes active RFID GPS satellite and sensors. Available online athttp:\/\/goldiron.wordpress.com\/2009\/02\/25\/numerex\u2010unveils\u2010hybrid\u2010tag\u2010includes\u2010active\u2010rfid\u2010gps\u2010satellite\u2010and\u2010sensors\/February2009."},{"key":"e_1_2_7_55_1","unstructured":"BucknerM CrutcherR MooreMR SmithSF.GPS and sensor\u2010enabled RFID tags. Available online athttp:\/\/www.ornl.gov\/webworks\/cppr\/y2001\/pres\/118169.pdf"},{"key":"e_1_2_7_56_1","unstructured":"CropseyG.Designing a distance and speed algorithm using the global positioning system. Available online athttp:\/\/www.egr.msu.edu\/classes\/ece480\/capstone\/spring08\/group10\/documents\/ApplicationNote\u2010Gabe.pdfMarch2008."},{"key":"e_1_2_7_57_1","unstructured":"GPS Glossary 2011. Available at:http:\/\/www.gsmarena.com\/glossary.php3?term=gps"},{"key":"e_1_2_7_58_1","unstructured":"66\u2010Channel LS20031 GPS Receiver Module 2011. Available at:http:\/\/www.megachip.ru\/pdf\/POLOLU\/66_CHANNEL.pdf"},{"key":"e_1_2_7_59_1","article-title":"Continuous location and direction estimation with multiple sensors using particle filtering","author":"Wendlandt K","year":"2006","journal-title":"IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems"},{"key":"e_1_2_7_60_1","unstructured":"QiuD LoS EngeP BonehD PetersonB.Geoencryption using Loran.The Institute of Navigation International Technical Meeting 2007."},{"key":"e_1_2_7_61_1","unstructured":"QiuD LoS EngeP BonehD PetersonB.Robust location tag generation from noisy location data for security applications.The Institute of Navigation International Technical Meeting 2009."},{"key":"e_1_2_7_62_1","unstructured":"WarnerJS JohnstonRG.Think GPS cargo tracking\u2009=\u2009high security?Technical report Los Alamos National Laboratory2003."},{"key":"e_1_2_7_63_1","unstructured":"PapadimitratosP JovanovicA.Protection and fundamental vulnerability of global navigation satellite systems (GNSS).International Workshop on Satellite and Space Communications(IWSSC)."},{"key":"e_1_2_7_64_1","unstructured":"HanlonB LedvinaB PsiakiM JrPK HumphreysTE.Assessing the GPS spoofing threat. GPS world. Available online athttp:\/\/www.gpsworld.com\/defense\/security\u2010surveillance\/assessing\u2010spoofing\u2010threat\u20103171?page_id=1January2009."},{"key":"e_1_2_7_65_1","unstructured":"ScottL.Anti\u2010spoofing and authenticated signal architectures for civil navigation signals.16th International Technical Meeting of the Satellite Division of the Institute of Navigation(ION GPS\/GNSS) 2003;1543\u20131552."},{"key":"e_1_2_7_66_1","doi-asserted-by":"crossref","unstructured":"KuhnM.An asymmetric security mechanism for navigation signals.6th Information Hiding Workshop 2004.","DOI":"10.1007\/978-3-540-30114-1_17"},{"key":"e_1_2_7_67_1","first-page":"1","volume-title":"IEEE Military Communications Conference (MILCOM)","author":"Papadimitratos P","year":"2008"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.404","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.404","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T02:00:16Z","timestamp":1696471216000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,22]]},"references-count":66,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["10.1002\/sec.404"],"URL":"https:\/\/doi.org\/10.1002\/sec.404","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,12,22]]}}}