Researchers at Edith Cowan University have proven Generation One radio frequency identification (RFID) tags can be breached to cause a denial-of-service (DoS) attack on the tags, using cheap store-bought radio transmitters. Generation One tags, currently used by the U.S. Department of Defense and many Australian organizations engaging in RFID trials, operate in the 902-938MHz range. Researchers have proven a DoS attack on the actual tags will cause them to enter an error state, allowing someone to input incorrect prices or alter location and destination parameters. Ken Wild, senior research support engineer at the School of Computer and Information Science at Edith Cowan University in Western Australia, said information protocols the tags use have been simplified greatly and have left them with a “bit of a hole.”Wild said Generation One tags have been designed to run on low power with an extended frequency range, without any room left for sophisticated, and secure, communications protocols. “The tag receives what it considers an intelligent signal in the right kind of modulation, attempts to decode and then considers the signal as an uncorrectable error. The tags then reset themselves to an error state, the same status as the initial power-up state,” Wild said. “Generation 2 tags have got a much more sophisticated security, but they are still vulnerable at the air interface and you can still listen in. “We have some very sophisticated monitoring at the university, but in reality, one could interfere with the tags using very simple gear—the transceiver we used is worth A$140 (US$102.70), and that is the top-end stuff.” Only recently, students from Vrije Universiteit Amsterdam in the Netherlands wrote a virus to fit on an RFID tag, but vendors have since dismissed the possibility of RFID viruses, saying the amount of memory in the tags is too small.-Michael Crawford, Computerworld Today (Australia)Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe