Recovering and restoring tampered RFID data using steganographic principles
Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try...
| Main Authors: | , , |
|---|---|
| Format: | Conference Paper |
| Published: |
IEEE Computer Society Press
2006
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/30814 |
| _version_ | 1848753197452099584 |
|---|---|
| author | Mohan, M. Potdar, Vidyasagar Chang, Elizabeth |
| author_facet | Mohan, M. Potdar, Vidyasagar Chang, Elizabeth |
| author_sort | Mohan, M. |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try to solve the issue of data recovery after RFID data has been tampered. To address this issue, we present a novel steganographic solution, which embeds a secret pattern in the serial number partition of the RFID tag. This secret pattern is the data that we assume would most likely be the candidate for tampering, for example the manufacturer?s and products details stored on the RFID tag. The main motivation for an attacker to tamper this data would be economic benefits like low logistics cost, or quicker custom clearance, and this can only be achieved by changing product details or manufacturer details on the RFID tag. The novelty of this scheme lies in the fact that we have applied steganographic principles to RFID tags; in comparison, most of the existing steganographic solutions are limited to images, or audio, or video applications. We term this scheme ResTamp because it is restores tampered data. This paper provides a detailed theoretical foundation for the ResTamp algorithm. |
| first_indexed | 2025-11-14T08:20:41Z |
| format | Conference Paper |
| id | curtin-20.500.11937-30814 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T08:20:41Z |
| publishDate | 2006 |
| publisher | IEEE Computer Society Press |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-308142017-01-30T13:21:40Z Recovering and restoring tampered RFID data using steganographic principles Mohan, M. Potdar, Vidyasagar Chang, Elizabeth ResTamp algorithm RFID RFID tags privacy steganographic principles security tampered RFID data tampered data recovery recovering and restoring steganographic radio frequency identification Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try to solve the issue of data recovery after RFID data has been tampered. To address this issue, we present a novel steganographic solution, which embeds a secret pattern in the serial number partition of the RFID tag. This secret pattern is the data that we assume would most likely be the candidate for tampering, for example the manufacturer?s and products details stored on the RFID tag. The main motivation for an attacker to tamper this data would be economic benefits like low logistics cost, or quicker custom clearance, and this can only be achieved by changing product details or manufacturer details on the RFID tag. The novelty of this scheme lies in the fact that we have applied steganographic principles to RFID tags; in comparison, most of the existing steganographic solutions are limited to images, or audio, or video applications. We term this scheme ResTamp because it is restores tampered data. This paper provides a detailed theoretical foundation for the ResTamp algorithm. 2006 Conference Paper http://hdl.handle.net/20.500.11937/30814 IEEE Computer Society Press fulltext |
| spellingShingle | ResTamp algorithm RFID RFID tags privacy steganographic principles security tampered RFID data tampered data recovery recovering and restoring steganographic radio frequency identification Mohan, M. Potdar, Vidyasagar Chang, Elizabeth Recovering and restoring tampered RFID data using steganographic principles |
| title | Recovering and restoring tampered RFID data using steganographic principles |
| title_full | Recovering and restoring tampered RFID data using steganographic principles |
| title_fullStr | Recovering and restoring tampered RFID data using steganographic principles |
| title_full_unstemmed | Recovering and restoring tampered RFID data using steganographic principles |
| title_short | Recovering and restoring tampered RFID data using steganographic principles |
| title_sort | recovering and restoring tampered rfid data using steganographic principles |
| topic | ResTamp algorithm RFID RFID tags privacy steganographic principles security tampered RFID data tampered data recovery recovering and restoring steganographic radio frequency identification |
| url | http://hdl.handle.net/20.500.11937/30814 |