hh.sePublikasjoner
Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Evaluating intrusion detection points in an end-to-end solution
Högskolan i Halmstad, Akademin för informationsteknologi.
2023 (engelsk)Independent thesis Advanced level (degree of Master (One Year)), 10 poäng / 15 hpOppgave
Abstract [en]

Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. As both the RFID reader and tag can be located outside of secure premises, RFID communication can be a target of several cyber threats. Common cyber-attacks such as replay attacks, eavesdropping, or tag cloning can be associated with the lack of security of the communication channel between the reader and the tag or flaws of the implemented authentication protocols and encryption algorithms. This thesis briefly summarizes parts 4 and 3 of the ISO/IEC 14443 standard, which specify the initialization, selection, and transmission protocols in high-frequency RFID smart-card and reader communication. A formal security analysis was conducted to evaluate these protocols using a tool called Scyther. Then, an improved authentication protocol was proposed utilizing a commercially available feature, the Random Unique Identifier of the card (RID). The Scyther protocol verification results showed that implementing RID can prevent many RFID attacks such as, eavesdropping or replay attacks, and protect the cardholder's privacy.

sted, utgiver, år, opplag, sider
2023. , s. 56
Emneord [en]
RFID, Random UID, Mutual Authentication, Scyther
HSV kategori
Identifikatorer
URN: urn:nbn:se:hh:diva-50870OAI: oai:DiVA.org:hh-50870DiVA, id: diva2:1771420
Eksternt samarbeid
Axis Communications
Fag / kurs
Digital Forensics
Utdanningsprogram
Master's Programme in Network Forensics, 60 credits
Veileder
Examiner
Tilgjengelig fra: 2023-05-24 Laget: 2023-06-20 Sist oppdatert: 2023-08-10bibliografisk kontrollert

Open Access i DiVA

fulltext(991 kB)182 nedlastinger
Filinformasjon
Fil FULLTEXT02.pdfFilstørrelse 991 kBChecksum SHA-512
e5ae711f3f0bfb6d0f9c66947ebc878546e244cfb4684d2116eac14d486123bb84805c3409724cd3aeee9d5b8e0c8b27305654b7bcd852a6e7d0f324e089f368
Type fulltextMimetype application/pdf

Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar
Totalt: 182 nedlastinger
Antall nedlastinger er summen av alle nedlastinger av alle fulltekster. Det kan for eksempel være tidligere versjoner som er ikke lenger tilgjengelige

urn-nbn

Altmetric

urn-nbn
Totalt: 394 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf