What type of rfid tag is more appropriate for ws-pass, Computer Network Security

Assignment Help:

Consider the following case study:

In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated toll paying system. The new system uses RFID technologies where each subscriber is given an RFID tag designed to be carried on the windshield of their vehicle. The reader antennas are mounted on a gantry approximately 20 feet above the roadway and all the transactions are sent to a database server, as shown in the following diagram.

2392_Types of attacks possible on WS-Pass system.png

Answer the following questions based on the above scenario.

(a) What type of RFID tag is more appropriate for WS-Pass? Justify your answer.

(b) Discuss on how complacency can cause serious security problems to WS-Pass in the future.

(c) Give one typical use of RFID technology, other than road toll payment.

(d) On a rainy night, an attacker decides to temporarily disable his tag before driving through the toll booth.

i. Elaborate on two techniques which the attacker can adopt to physically disable the RFID tag for a temporarily basis.

ii. Discuss on one technique that WS-Pass can adopt in order to prevent such incidences from occurring whereby ensuring that every car is charged the toll fee.

(e) Unauthorized tag reading has often been a security challenge for RFID systems.

i. By making reference to the diagram, explain how an attacker can secretly read particular tags.

ii. Describe two mechanisms that can be adopted to enforce confidentiality during transmission by RFID components.

(f) Briefly discuss on the following types of attacks possible on WS-Pass system.

i. Crypto attacks
ii. Covert channels


Related Discussions:- What type of rfid tag is more appropriate for ws-pass

Star topology, STAR TOPOLOGY In this topology, all devices are attache...

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

Virtual terminal protocol vtp, Write down the short notes on VTR.  Communic...

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

Maximum transmission unit (mtu), Maximum Transmission Unit  (MTU) Eac...

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

Important features of application layer, Describe the important features of...

Describe the important features of application layer. The features of the application layer are as follows. 1. Efficient User Interface Design is explained below: Appli

Tcp- reliable transport service, TCP-RELIABLE TRANSPORT SERVICE INTRO...

TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe

Risk determination, Risk Determination For purpose of relative risk asse...

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

Develop firewall rules based on a fictitious organisation, Question requir...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

Location to e-mail messages are saved, In the e-mail system, where the e-ma...

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

Why use an ids, WHY USE AN IDS? IDS prevent from problem behaviors by in...

WHY USE AN IDS? IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd