Recovering and restoring tampered RFID data using steganographic principles

Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try...

Full description

Bibliographic Details
Main Authors: Mohan, M., Potdar, Vidyasagar, Chang, Elizabeth
Format: Conference Paper
Published: IEEE Computer Society Press 2006
Subjects:
Online Access:http://hdl.handle.net/20.500.11937/30814
_version_ 1848753197452099584
author Mohan, M.
Potdar, Vidyasagar
Chang, Elizabeth
author_facet Mohan, M.
Potdar, Vidyasagar
Chang, Elizabeth
author_sort Mohan, M.
building Curtin Institutional Repository
collection Online Access
description Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try to solve the issue of data recovery after RFID data has been tampered. To address this issue, we present a novel steganographic solution, which embeds a secret pattern in the serial number partition of the RFID tag. This secret pattern is the data that we assume would most likely be the candidate for tampering, for example the manufacturer?s and products details stored on the RFID tag. The main motivation for an attacker to tamper this data would be economic benefits like low logistics cost, or quicker custom clearance, and this can only be achieved by changing product details or manufacturer details on the RFID tag. The novelty of this scheme lies in the fact that we have applied steganographic principles to RFID tags; in comparison, most of the existing steganographic solutions are limited to images, or audio, or video applications. We term this scheme ResTamp because it is restores tampered data. This paper provides a detailed theoretical foundation for the ResTamp algorithm.
first_indexed 2025-11-14T08:20:41Z
format Conference Paper
id curtin-20.500.11937-30814
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T08:20:41Z
publishDate 2006
publisher IEEE Computer Society Press
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-308142017-01-30T13:21:40Z Recovering and restoring tampered RFID data using steganographic principles Mohan, M. Potdar, Vidyasagar Chang, Elizabeth ResTamp algorithm RFID RFID tags privacy steganographic principles security tampered RFID data tampered data recovery recovering and restoring steganographic radio frequency identification Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try to solve the issue of data recovery after RFID data has been tampered. To address this issue, we present a novel steganographic solution, which embeds a secret pattern in the serial number partition of the RFID tag. This secret pattern is the data that we assume would most likely be the candidate for tampering, for example the manufacturer?s and products details stored on the RFID tag. The main motivation for an attacker to tamper this data would be economic benefits like low logistics cost, or quicker custom clearance, and this can only be achieved by changing product details or manufacturer details on the RFID tag. The novelty of this scheme lies in the fact that we have applied steganographic principles to RFID tags; in comparison, most of the existing steganographic solutions are limited to images, or audio, or video applications. We term this scheme ResTamp because it is restores tampered data. This paper provides a detailed theoretical foundation for the ResTamp algorithm. 2006 Conference Paper http://hdl.handle.net/20.500.11937/30814 IEEE Computer Society Press fulltext
spellingShingle ResTamp algorithm
RFID
RFID tags
privacy
steganographic principles
security
tampered RFID data
tampered
data recovery
recovering and restoring
steganographic
radio frequency identification
Mohan, M.
Potdar, Vidyasagar
Chang, Elizabeth
Recovering and restoring tampered RFID data using steganographic principles
title Recovering and restoring tampered RFID data using steganographic principles
title_full Recovering and restoring tampered RFID data using steganographic principles
title_fullStr Recovering and restoring tampered RFID data using steganographic principles
title_full_unstemmed Recovering and restoring tampered RFID data using steganographic principles
title_short Recovering and restoring tampered RFID data using steganographic principles
title_sort recovering and restoring tampered rfid data using steganographic principles
topic ResTamp algorithm
RFID
RFID tags
privacy
steganographic principles
security
tampered RFID data
tampered
data recovery
recovering and restoring
steganographic
radio frequency identification
url http://hdl.handle.net/20.500.11937/30814