Radio Frequency Identification - PowerPoint PPT Presentation

1 / 19
About This Presentation
Title:

Radio Frequency Identification

Description:

Airline passenger and baggage tracking made practical and less intrusive. Authentication systems already in use (key-less car entry) Types of Attack. Spoofing ... – PowerPoint PPT presentation

Number of Views:67
Avg rating:3.0/5.0
Slides: 20
Provided by: Mit136
Category:

less

Transcript and Presenter's Notes

Title: Radio Frequency Identification


1
Radio Frequency Identification
By Bhagyesh Lodha Vinit Mahedia Vishnu
Saran Mitesh Bhawsar
2
Introduction
  • Automatic Identification method for storing and
    retrieving data remotely
  • Small object which is embedded inside a person,
    animal or any product
  • A silicon microchip mainly Integrated Circuit
    attached to Antenna for Transmitting and
    receiving of data.

3
Introduction (continue)
  • RFID reader wirelessly communicate with the tag
    to retrieve information
  • The Reader and tag communicates with each other
    through Radio Frequency

4
RF Subsystem
  • RFID Tags
  • - Electronic device Affix inside any object.
  • - Each Tag has Unique Identifier.
  • - Has memory, environment sensors and security
    mechanism.
  • RFID Readers
  • - Communicates with RFID Tags
  • RFID Tags and Readers are 2 way communication.

5
RFID Tag Characteristics
  • Identifier Format
  • - Uniquely identifies tags
  • - Data Format used is Electronic Product Code.
  • - Four data fields

Header EPC Manager Id Object Class Serial Number
Specifies EPC type Uniquely Define the organization responsible Uniquely identifies class object Uniquely identifies instants of class object
6
RFID Tag Characteristics (Continue)
  • Power Source
  • 1. Passive
  • - Has no internal power supply
  • - Incoming radio frequency gives enough power to
    CMOS IC to power up
  • - Antenna is designed to collect power.

7
RFID Tag Characteristics (continue)
  • 2. Active
  • - Has own internal power source
  • - Uses for high power source, in water and may
    have sensors
  • 3. Semi Passive
  • - Has battery but only powers the IC and does
    not help in transmitting any signal
  • - Usually stores energy

8
RFID Security Controls
  • RFID Usage Policy
  • - Authorized and Unauthorized use of RFID
  • Minimizing sensitive Data Stored on Tag
  • HMAC
  • Tag Memory Access Control
  • Encryption of Data

9
Authentication
  • Assurance of identity of an entity at other end
  • Secret Key or Public key Cryptography is used
  • Public key Cryptography is more preferable since
    there is no key exchange and public key is
    transfer through digital signature
  • Two methods
  • - Zero Knowledge Protocol
  • - Challenge Response Protocol

10
Challenge Response Protocol
  • Reader sends challenge to the RFID tag
  • The challenge is encrypted public key made from
    private key
  • RFID Tag decrypts the response with its on
    private key and result is same along with sending
    a response to the Reader
  • RFID Tag has EPROM memory to store the private
    key with microcontroller to process the request.

11
Challenge Response Protocol (continue)
RFID TAG With Authentication Mechanism
12
Challenge Response Protocol (continue)
Protocol Implementation
13
Applications
  • Tracking goods during supply chain and
    manufacturing process.
  • Controlled access to building or network
  • Scanning objects
  • Payment systems
  • Airline passenger and baggage tracking made
    practical and less intrusive
  • Authentication systems already in use (key-less
    car entry)

14
Types of Attack
  • Spoofing
  • Incorrect data , e.g. wrong domains
  • Insert
  • SQL Injection
  • Replay
  • Original message replayed later
  • Denial of Service
  • Signal with redundant data flooding

15
(No Transcript)
16
Attacks Cont.
  • Blended Attacks
  • attack the RF interface of a retailer

17
Electronic Product Code
  • EPC
  • The EPC is the fundamental identifier for a
    physical object. Auto-ID
  • Electronic Product Code Data Specification 1.0
    defines the abstract content
  • of the EPC in the form of RFID tags, Internet
    URLs, and other representations.

18
RFID Middleware Overview
19
DES Encryption Algorithm
Write a Comment
User Comments (0)
About PowerShow.com