What type of rfid tag is more appropriate for ws-pass, Computer Network Security

Assignment Help:

Consider the following case study:

In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated toll paying system. The new system uses RFID technologies where each subscriber is given an RFID tag designed to be carried on the windshield of their vehicle. The reader antennas are mounted on a gantry approximately 20 feet above the roadway and all the transactions are sent to a database server, as shown in the following diagram.

2392_Types of attacks possible on WS-Pass system.png

Answer the following questions based on the above scenario.

(a) What type of RFID tag is more appropriate for WS-Pass? Justify your answer.

(b) Discuss on how complacency can cause serious security problems to WS-Pass in the future.

(c) Give one typical use of RFID technology, other than road toll payment.

(d) On a rainy night, an attacker decides to temporarily disable his tag before driving through the toll booth.

i. Elaborate on two techniques which the attacker can adopt to physically disable the RFID tag for a temporarily basis.

ii. Discuss on one technique that WS-Pass can adopt in order to prevent such incidences from occurring whereby ensuring that every car is charged the toll fee.

(e) Unauthorized tag reading has often been a security challenge for RFID systems.

i. By making reference to the diagram, explain how an attacker can secretly read particular tags.

ii. Describe two mechanisms that can be adopted to enforce confidentiality during transmission by RFID components.

(f) Briefly discuss on the following types of attacks possible on WS-Pass system.

i. Crypto attacks
ii. Covert channels


Related Discussions:- What type of rfid tag is more appropriate for ws-pass

Transmission errors in networking, TRANSMISSION ERRORS:  Transmission...

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Systems development life cycle security-information security, The Role of t...

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Logic bombs - attacks information security, Example 3: Logic bombs In th...

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Using Technology as Experience Framework, Write a two to three (2-3) page p...

Write a two to three (2-3) page paper in which you: Explain how the Web user interfaces help donors to make decisions. Relate the emotional thread demonstrated in the case study to

Hardware, Hardware, Software, and Network Asset Identification What info...

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

Explain any two types of security policies, Question 1 Explain any two typ...

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Computer security, Implementing an effective online authentication scheme i...

Implementing an effective online authentication scheme in practice faces many challenges. Systems with highly sensitive data often require multifactor authentication. But, requirin

Network design approach, Problem a) Give three reasons why traditional ...

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Cyclic redundancy check (crc), CYCLIC REDUNDANCY CHECK (CRC) To activa...

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd