radio frequency identification by bhagyesh lodha vinit mahedia vishnu saran mitesh bhawsar
TRANSCRIPT
Radio Frequency Identification
ByBhagyesh LodhaVinit MahediaVishnu SaranMitesh Bhawsar
Introduction Automatic Identification method for storing and
retrieving data remotely Small object which is embedded inside a person,
animal or any product A silicon microchip mainly Integrated Circuit
attached to Antenna for Transmitting and receiving of data.
RFID reader wirelessly communicate with the tag to retrieve information
The Reader and tag communicates with each other through Radio Frequency
Introduction (continue…)
RF Subsystem RFID Tags
- Electronic device Affix inside any object.
- Each Tag has Unique Identifier.
- Has memory, environment sensors and security mechanism.
RFID Readers
- Communicates with RFID Tags RFID Tags and Readers are 2 way communication.
RFID Tag Characteristics Identifier Format
- Uniquely identifies tags
- Data Format used is Electronic Product Code.
- Four data fieldsHeader EPC Manager Id Object Class Serial Number
Specifies EPC type
Uniquely Define the organization responsible
Uniquely identifies class object
Uniquely identifies instants of class object
Power Source1. Passive:- Has no internal power supply- Incoming radio frequency gives enough power to CMOS IC to power up- Antenna is designed to collect power.
RFID Tag Characteristics (Continue)
2. Active- Has own internal power source- Uses for high power source, in water and may have sensors3. Semi Passive- Has battery but only powers the IC and does not help in transmitting any signal- Usually stores energy
RFID Tag Characteristics (continue)
RFID Security Controls RFID Usage Policy
- Authorized and Unauthorized use of RFID Minimizing sensitive Data Stored on Tag HMAC Tag Memory Access Control Encryption of Data
Authentication Assurance of identity of an entity at other end Secret Key or Public key Cryptography is used Public key Cryptography is more preferable since
there is no key exchange and public key is transfer through digital signature
Two methods
- Zero Knowledge Protocol
- Challenge Response Protocol
Challenge Response Protocol Reader sends challenge to the RFID tag The challenge is encrypted public key made from
private key RFID Tag decrypts the response with its on private
key and result is same along with sending a response to the Reader
RFID Tag has EPROM memory to store the private key with microcontroller to process the request.
RFID TAG With Authentication Mechanism
Challenge Response Protocol (continue)
Protocol Implementation
Challenge Response Protocol (continue)
Applications Tracking goods during supply chain and
manufacturing process. Controlled access to building or network Scanning objects Payment systems Airline passenger and baggage tracking made
practical and less intrusive Authentication systems already in use (key-less car
entry)
Types of Attack• Spoofing
Incorrect data , e.g. wrong domains • Insert
SQL Injection• Replay
Original message replayed later • Denial of Service
Signal with redundant data flooding
Attacks Cont. Blended Attacks
attack the RF interface of a retailer
Electronic Product Code EPC
The EPC is the fundamental identifier for a physical object. Auto-ID
Electronic Product Code Data Specification 1.0 defines the abstract content
of the EPC in the form of RFID tags, Internet URLs, and other representations.
RFID Middleware Overview
DES Encryption Algorithm