the tags and counterfeits. However, more advanced
techniques will be necessary since the smart tags em-
ploy cryptographic routines and other features. The
detectable timing issues should also occur when a re-
lay attack is performed.
The schematic and firmware of the construction
presented in this paper is available upon request.
ACKNOWLEDGEMENTS
This work was partially supported by the grant of SGS
No. SP2014/170, V
ˇ
SB - Technical University of Os-
trava, Czech Republic.
REFERENCES
Atmel Corporation (2014). ATA5577C Read/Write LF
RFID IDIC 100 to 150 khz. Technical Datasheet, rev.
9187HRFID07/14.
Blass, E.-O., Elkhiyaoui, K., and Molva, R. (2011). Tracker
: security and privacy for RFID-based supply chains.
In NDSS 2011, 18th Annual Network and Distributed
System Security Symposium, 6-9 February 2011, San
Diego, CA, USA, San Diego, UNITED STATES.
de Koning Gans, G., Hoepman, J.-H., and Garcia, F. (2008).
A practical attack on the MIFARE Classic. In Gri-
maud, G. and Standaert, F.-X., editors, Smart Card
Research and Advanced Applications, volume 5189 of
Lecture Notes in Computer Science, pages 267–282.
Springer Berlin Heidelberg.
Dowty, M. (2010). Software-only implementation
of a passive low-frequency RFID tag, using an
AVR microcontroller. Source code. Available at
http://svn.navi.cx/misc/trunk/avrfid/avrfid.S.
EM Microelectronic-Marin SA (2004). EM4100 read only
contactless identification device. Technical Datasheet.
Garcia, F., de Koning Gans, G., Verdult, R., and Meriac, M.
(2012). Dismantling iclass and iclass elite. In Foresti,
S., Yung, M., and Martinelli, F., editors, Computer Se-
curity ESORICS 2012, volume 7459 of Lecture Notes
in Computer Science, pages 697–715. Springer Berlin
Heidelberg.
Hancke, G. (2005). A practical relay attack on ISO 14443
proximity cards. Technical report.
Hancke, G. (2006). Practical attacks on proximity identifi-
cation systems. In Security and Privacy, 2006 IEEE
Symposium on, pages 6 pp.–333.
Issovits, W. and Hutter, M. (2011). Weaknesses of
the ISO/IEC 14443 protocol regarding relay attacks.
In RFID-Technologies and Applications (RFID-TA),
2011 IEEE International Conference on, pages 335–
342.
Koh, R., Schuster, E. W., Chackrabarti, I., and Bellman,
A. (2003). Securing the pharmaceutical supply chain.
White Paper, Auto-ID Labs, Massachusetts Institute of
Technology, pages 1–19.
Koscher, K., Juels, A., Brajkovic, V., and Kohno, T.
(2009). Epc RFID tag security weaknesses and de-
fenses: Passport cards, enhanced drivers licenses, and
beyond. In Proceedings of the 16th ACM Conference
on Computer and Communications Security, CCS ’09,
pages 33–42, New York, NY, USA. ACM.
Krumnikl, M. (2007). Unique (EM4001) RFID emulator.
Technical report, Department of Computer Science.
V
ˇ
SB - Technical University of Ostrava.
Lehtonen, M., Ostojic, D., Ilic, A., and Michahelles, F.
(2009). Securing RFID systems by detecting tag
cloning. In Tokuda, H., Beigl, M., Friday, A., Brush,
A., and Tobe, Y., editors, Pervasive Computing, vol-
ume 5538 of Lecture Notes in Computer Science,
pages 291–308. Springer Berlin Heidelberg.
Mackey, T. K. and Liang, B. A. (2011). The global counter-
feit drug trade: patient safety and public health risks.
Journal of pharmaceutical sciences, 100(11):4571–
4579.
Mitrokotsa, A., Rieback, M., and Tanenbaum, A. (2010).
Classifying RFID attacks and defenses. Information
Systems Frontiers, 12(5):491–505.
Oswald, D. and Paar, C. (2011). Breaking Mifare DESFire
MF3ICD40: Power analysis and templates in the real
world. In Preneel, B. and Takagi, T., editors, Cryp-
tographic Hardware and Embedded Systems CHES
2011, volume 6917 of Lecture Notes in Computer Sci-
ence, pages 207–222. Springer Berlin Heidelberg.
Verdult, R., Garcia, F. D., and Balasch, J. (2012). Gone in
360 seconds: Hijacking with Hitag2. In Proceedings
of the 21st USENIX Conference on Security Sympo-
sium, Security’12, pages 37–37, Berkeley, CA, USA.
USENIX Association.
Zanetti, D., Capkun, S., and Juels, A. (2013). Tailing RFID
tags for clone detection. In NDSS.
PECCS2015-5thInternationalConferenceonPervasiveandEmbeddedComputingandCommunicationSystems
82