rfid research at adelaide
TRANSCRIPT
![Page 1: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/1.jpg)
18 October 2006 Some aspects of Adelaide Research 11
RFID Research at Adelaide
Peter H. Cole
Professor of RFID Systems at the University of Adelaide and Director of the Auto-ID Laboratory @ Adelaide
![Page 2: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/2.jpg)
18 October 2006 Some aspects of Adelaide Research 2
Outline
• Data Gathering Readers• Tags for embedding in metal• Small tags in difficult situations• Lightweight cryptography for security
and authentication• Microelectronic turn on circuits• Micromachining turn on circuits
![Page 3: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/3.jpg)
18 October 2006 Some aspects of Adelaide Research 33
Data Gathering Readers
![Page 4: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/4.jpg)
18 October 2006 Some aspects of Adelaide Research 4
Objectives
• Development of a new RFID instrument• Collect & record data• Display, analyze and model data• Turn data into information
– Information can be passed to other readers by a network or a host PC.• Keep data as raw
– Pass data to PC for later processing & detailed analysis.• Buffering
– Caching and buffering to prevent blocking.• Firmware upgradeable• USB and Ethernet Interfaces
– Can be used for upgrades, monitoring and data communication.• Would allow to improve
– Efficiency, performance, accuracy, reliability, energy consumption, quality assurance, etc.
![Page 5: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/5.jpg)
18 October 2006 Some aspects of Adelaide Research 5
Implementation
• Modular design:1.DSP 2.Micro-controller3.ADC & DAC4.RF Front-end5.Host Computer Interface
![Page 6: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/6.jpg)
18 October 2006 Some aspects of Adelaide Research 6
Experimental Results
![Page 7: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/7.jpg)
18 October 2006 Some aspects of Adelaide Research 7
Applications for SDLR
• Analysis and development of reader architectures (as a template)
• Analysis and measurement of new forms of reader to tag signalling (pulse shaping, etc)
• Analysis of measuring equipment, i.e. understanding the test regulations with respect to the forms of signalling employed by RFID readers
• Interference studies in high density reader environments
• Electromagnetic propagation studies applicable to European Regulations (LBT)
![Page 8: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/8.jpg)
18 October 2006 Some aspects of Adelaide Research 88
Small Tags in Difficult Situations
![Page 9: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/9.jpg)
18 October 2006 Some aspects of Adelaide Research 9
Bode-Fano Limit
VS
RS
ZIN
LOSSLESSMATCHINGNETWORK
RC
RCπ dω 1ln
0
≤Γ∫
∞
![Page 10: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/10.jpg)
18 October 2006 Some aspects of Adelaide Research 10
Bode-Fano Limit (cont)
• Assume R = 1 kΩ, C = 1 pF
• R = 10 kΩ, C = 1 pF (for less powerconsuming tag chip in practice)
![Page 11: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/11.jpg)
18 October 2006 Some aspects of Adelaide Research 11
A Simple RFID Tag
• Consists of a circular loop antenna with a matching network naturally built into the antenna
FRONT REAR
![Page 12: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/12.jpg)
18 October 2006 Some aspects of Adelaide Research 12
Tag for embedding in metal
• Design of an embedded UHF RFID label antenna for a metal structure
![Page 13: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/13.jpg)
18 October 2006 Some aspects of Adelaide Research 1313
Cryptography for Security and Authentication in RFID
![Page 14: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/14.jpg)
18 October 2006 Some aspects of Adelaide Research 14
Security and Privacy Holes
• Outlines vulnerabilities unique to low cost RFID systems
• Provides a realistic assessment of current low cost RFID technology
• Methodologies for addressing vulnerabilities– A review of methodologies applicable to low cost RFID
• Formulation of a framework within which to address vulnerabilities in low cost systems
![Page 15: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/15.jpg)
18 October 2006 Some aspects of Adelaide Research 15
Elliptic curve cryptography
• Based on group theory for cyclic additive and multiplicative groups
• Underlying fields can be prime fields and or binary fields
• Different calculations in each case• Calculations faster that RSA• Smaller codes than RSA• Can it be applied to passive RFID?
![Page 16: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/16.jpg)
18 October 2006 Some aspects of Adelaide Research 16
The PUF solution
• Storage of long term secrets on tags is not possible– Physical attacks– Brute force attacks
• Authentication using keys stored on tags is insecure
• PUFs provide a method for storing secret information on tags without the need for tamper proofing
• Investigating the use of PUF for secure and low cost authentication
• Future research directions
![Page 17: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/17.jpg)
18 October 2006 Some aspects of Adelaide Research 17
• Use of PUFs on RFID tags to securely store keys
• 800 challenge-response pairs to uniquely identify over 109 chips
c0 c1 c2 c61 c62 c63
01
Switch component
Arbiter
ci=0 c0=1
Switch component operation
0
Arbiter operation as the race between the signal ends as the
arbiter
Arbiter
Arbiter
1
PUF Structure
![Page 18: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/18.jpg)
18 October 2006 Some aspects of Adelaide Research 18
Addressing eavesdropping
• Need to provide a service for providing confidentiality• Use a PUF to initialize LFSRs• Use a shrinking generator to create a key stream• LFSR – lightweight hardware
PUF Circuit Block
CHALLENGE SET
KStream cipher
constructed using a NFSR
⊕
CIPHERTEXT
PLAINTEXT
LFSR R2
LFSR R1
Output ( )kCE CLK
D QBuffer
Clock
![Page 19: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/19.jpg)
18 October 2006 Some aspects of Adelaide Research 19
The shrinking function
• Two linear shift registers, A (data) and S (sampling), with different seeds, clocked together.
• Outputs are combined as follows– If S is 1, output is A– If S is 0, there is no output and another clock is applied
• This scheme has been resistant to cryptanalysis for 12 years. No known attacks if feedback polynomials are secret and registers are too long for an exhaustive search.
![Page 20: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/20.jpg)
18 October 2006 Some aspects of Adelaide Research 20
One time codes: 1
• Have available a set of purely random numbers in the tag and matching tag dependent number in a secure data based
• Some are to authenticate the tag to a reader, some to authenticate a reader to a tag, some might be to permit authenticated change of tag identity to prevent trace of items
• Use certain of these to XOR with tag identities to disguise them from eavesdroppers.
![Page 21: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/21.jpg)
18 October 2006 Some aspects of Adelaide Research 21
One time codes: 2
• Need a large supply to cater for many authentications
• Options– Reserve a pair for final authentication by end user– Recharge in a secure environment– Assume an eavesdropper cannot be every where and use
old codes for identity change for fresh reader or tag authentications
– Better to use a shrinking function
![Page 22: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/22.jpg)
18 October 2006 Some aspects of Adelaide Research 2222
Micromechanical Turn-on Circuits
![Page 23: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/23.jpg)
18 October 2006 Some aspects of Adelaide Research 23
Turn-on circuits
• Battery-powered labels must have very low current consumption in order to prolong the life of the battery.
• However due to circuit complexity or the desired range the electronics drain the battery more rapidly than desired.
• Labels require a means of turning “on” and “off” the onboard battery support at the start and at the end of a communication, to conserve power and thus prolong battery life.– Solutions available
• Electroacoustic energy conversion using a MEMS device• Rectifier diode resonance
![Page 24: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/24.jpg)
18 October 2006 Some aspects of Adelaide Research 24
Outcomes
• Analysis of turn on circuit concepts– Diode resonance– MEMS structures
![Page 25: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/25.jpg)
18 October 2006 Some aspects of Adelaide Research 25
Thank you
![Page 26: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/26.jpg)
18 October 2006 Some aspects of Adelaide Research 26
Current Problems
• RFID reliability and accuracy– RFID is not yet 100% reliable. – Current approaches to increasing reliability need to be enhanced.
• Standards• Interference
– Proliferation of wireless devices using shared bandwidth.– Proliferation of RFID readers will also reduce the available bandwidth
(phone, wi-fi.)– Malicious interference must be detected such as RF jamming and
spoofing.
• Security– Readable outside supply chain without your consent at large
distance, difficult to remove.
![Page 27: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/27.jpg)
18 October 2006 Some aspects of Adelaide Research 2727
Microelectronic Turn-on Circuits
![Page 28: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/28.jpg)
18 October 2006 Some aspects of Adelaide Research 28
A low voltage turn on circuit
• Sensitivity about 5 mV• Power consumption few nA
![Page 29: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/29.jpg)
18 October 2006 Some aspects of Adelaide Research 29
Transmitter operated systems
• A small voltage or a large is generated from the transmitted power
• A low power consumption circuit, or a zero power consumption circuit, detects that event
• Quality factor and detuning issues arise
Junction capacitance
Bypass and reservoir
capacitance
Resonant circuit
Label antenna
D.C. output line
jXs
jXB
jXl
Rr
Ra
Rl
![Page 30: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/30.jpg)
18 October 2006 Some aspects of Adelaide Research 30
Experiments on detuning
1MΩ
10kΩ 11.5pF
Rectified voltage to Oscilloscope using a BNC connector
RF IN through an SMA connector
![Page 31: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/31.jpg)
18 October 2006 Some aspects of Adelaide Research 31
Low and high power sweeps
![Page 32: RFID Research at Adelaide](https://reader031.vdocuments.site/reader031/viewer/2022020207/559efea11a28abb1548b476a/html5/thumbnails/32.jpg)
18 October 2006 Some aspects of Adelaide Research 32
Elliptic code cryptography
• All parties must agree on domain parameters (p,a,b,G,n,h). These can come from an authority.
• Classes of weak curves are known and avoided as above.
• NIST has published some recommended combinations.
• Keys must be be large enough. A 109 bit key has been broken.