RFID - PowerPoint PPT Presentation

1 / 35
About This Presentation
Title:

RFID

Description:

RFID Technology Applications Risks Security Privacy RFID Radio Frequency IDentification Replaces the ubiquitous bar code Electronic Wireless Contains much information ... – PowerPoint PPT presentation

Number of Views:74
Avg rating:3.0/5.0
Slides: 36
Provided by: webpages71
Learn more at: http://webpages.sou.edu
Category:
Tags: rfid | tower

less

Transcript and Presenter's Notes

Title: RFID


1
RFID
  • Technology
  • Applications
  • Risks
  • Security
  • Privacy

2
RFID Radio Frequency IDentification
  • Replaces the ubiquitous bar code
  • Electronic
  • Wireless
  • Contains much information
  • Very flexible
  • Very powerful

3
RFID
  • NIST SP800-98
  • GAO Report
  • Is Your Cat Infected with a Computer Virus?
  • Melanie R. Rieback

4
Components of an RFID
  • Antenna
  • CPU/Chip, i.e. Computer
  • Substrate
  • Chip Reader Interrogator
  • Middleware Communications and Database
  • Analytic System

5
Gillettes Razor RFID
Close to actual size
Chip
Antenna
6
RFIDWhat is it? Small!
7
Hitatchis Answer
Human Hair
Tiny Radio Frequency Identification (RFID) chips,
64 times smaller than current devices, have been
developed by Hitatchi in Japan. Little bigger
than a grain of sand at 0.05 x 0.05mm, the chips
come with a 128-bit memory capable of storing an
identification number of up to 38 digits
8
(No Transcript)
9
(No Transcript)
10
RFIDs
  • Size is about the dot on an i or larger
  • Antenna can be up to several inches
  • Usually copper foil
  • Now can be conductive printer ink.
  • When the label is printed the RFID can be printed
    at the same time with sticky chip attacked

11
RFID Tag Printer
Tag Printer
12
RFID Interrogators
  • Hand held for inventory etc.
  • Fixed
  • Can read up to palette load of items
  • Overhead in a toll booth
  • Interrogation distances can be from a few
    centimeters to many meters
  • Subject to design considerations

13
Hand Held Interrogator
14
Fix Interrogator
15
(No Transcript)
16
RFID Placement
  • On the back of a Label
  • In the spine of a book
  • As part of the item
  • Within the person/animal

17
(No Transcript)
18
Active RFIDs
  • Active RFIDs will have a battery
  • Can have multiple sensors attached
  • Temperature
  • Humidity
  • Impact Accelerometer
  • Radiation dosimeter
  • Verifies proper shipping/storage specs
  • Used mainly for large shipments

19
(No Transcript)
20
Antenna Types
21
Examples
  • Passports
  • EPCs Electronic Bar Codes
  • Toll Roads
  • Baggage Tickets
  • Later
  • Smart Shelf Smart Store
  • Later
  • Operating Room Items
  • NAIS
  • Later

22
The Smart Shelf
  • Shopper photographed when item is selected
  • Each RFID has a unique ID Number
  • Quantity selected is known
  • Items are tracked throughout the store
  • Theft risk assessment is made
  • At checked out undeclared items are known

23
Gillettes Razor RFID
Close to actual size
Chip
Antenna
24
(No Transcript)
25
(No Transcript)
26
NAIS
  • National Animal Identification System
  • Recommended by USDA
  • States are the enforcers
  • State by state data bases
  • Non-compliance fines up to 5,000 per animal
  • Purpose
  • Track disease
  • Feed lots are exempt
  • Recommending Committee
  • Agri-Business
  • Chip Companies

27
Risks
  • RFID
  • Corruption/Compromise
  • RFID chip
  • Middleware
  • Data Bases
  • Interrogator
  • Impersonator
  • Middleware
  • Analytic System

28
Security
  • RIFD corruption
  • Baggage routing exploit
  • Does your cat have a virus?
  • Backend database compromise
  • Subject to the latest vulnerabilities
  • Subject to the latest exploits
  • Evesdropping
  • Passports in an Airport
  • Redesign

29
Virus Infection
  • Scenario
  • Baggage check in at the airport
  • Each bag gets an RFID
  • These RFIDs are printed at the check in counter
  • Routing info
  • All baggage handling equip read the RFID
  • Route correctly
  • A Bad RFID is put on the bag
  • This one corrupts the routing data base
  • SQL Injection vulnerability

30
Virus Infection
  • When the bad RFID is read the data base is
    corrupted
  • All new tags will have the same virus
  • As the tags move through the system all routing
    DBs will become corrupted

31
Privacy
  • Evesdropping
  • ID Association
  • Personality Profiling
  • Life Style Profiling

32
PrivacyEvesdropping
  • RFID contains personal information
  • Could be compromised
  • One card at a time
  • RFID contains serial number to a data base
  • Fairly secure from evesdropping
  • However
  • If the data base is compromised then the entire
    system is compromised

33
PrivacyID Association
  • A RFID is associated with you
  • Your credit card is associated with you and you
    have aand RFID on your clothing.
  • Your activities are tracked
  • In a smart store all of the merchandise you look
    at is logged.

34
PrivacyPersonality Profiling
  • Shopping history
  • Travel patterns
  • Profiling is based on an RFID assigned to you
  • Credit card
  • Smart card
  • etc.

35
PrivacyLife Style Profiling
  • RFID tracks
  • Cell phone travels
  • Tower by tower
  • GPS
  • Credit card purchases
Write a Comment
User Comments (0)
About PowerShow.com