Radio Frequency Identification (RFID)



Similar documents
CHAPTER 1 Introduction 1

RFID BASED VEHICLE TRACKING SYSTEM

RFID Design Principles

RFID Design Principles

Automated Identification Technologies

How To Understand The Power Of An Freddi Tag (Rfid) System

How Does It Work? Internet of Things

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RFID SECURITY. February The Government of the Hong Kong Special Administrative Region

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Using RFID Techniques for a Universal Identification Device

a GAO GAO INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government Report to Congressional Requesters

RF ID Security and Privacy

Evolving Bar Codes. Y398 Internship. William Holmes

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Radio Frequency Identification (RFID) Vs Barcodes

Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda

WHITE PAPER. ABCs of RFID

Complete Technology and RFID

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Radio Frequency Identification (RFID) An Overview

How China promoting RFID use in logistics. Mr. Wenfeng Wang Senior engineer, IT research center of CESI

EPCglobal RFID standards & regulations. Henri Barthel OECD Paris, 5 October 2005

Why Has the Development in RFID Technology Made Asset Management More Urgent?

The Place of Emerging RFID Technology in National Security and Development

International Journal of Engineering Research & Management Technology

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

RFID Radio Frequency Identification

The Study on RFID Security Method for Entrance Guard System

tags Figure D-1 Components of a Passive RFID System

SATO RFID White Paper

On the Security of RFID

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Ambient Intelligence WS 08/09 V8: RFID. Prof. Dr.-Ing. José L. Encarnação

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

RFID Security: Threats, solutions and open challenges

Redes y Servicios de Radio. RFID Systems

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?

Understanding RFID (Radio Frequency Identification)

RFID Basics HEGRO Belgium nv - Assesteenweg Ternat Tel.: +32 (0)2/ Fax : +32 (0)2/ info@hegrobelgium.

Time & Access System An RFID based technology

Security in RFID Networks and Protocols

An Introductory and Elementary Study on RFID & Its Applications

Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions

rf Technology to automate your BUsiness

Enabling the secure use of RFID

RFID Security and Privacy: A Research Survey. Vincent Naessens Studiedag Rabbit project

Atmel Innovative Silicon RFID IDIC Solutions

RFID Penetration Tests when the truth is stranger than fiction

IFI5481: RF Circuits, Theory and Design

How To Combine Active And Passive Rdi For A More Complete Solution

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department

RFID Technology, Security Vulnerabilities, and Countermeasures

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)

Guidelines for Securing Radio Frequency Identification (RFID) Systems

Using RFID for Supply Chain Management

Security and Privacy in RFID Applications

If you are interested in Radio Frequency Identification technology, then this is the best investment that you can make today!

The Drug Quality & Security Act

Modern Multipurpose Security Management System

Christoph Jechlitschek,

Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera

NEW TECHNOLOGY. Figure 1. Simplified view of data transfer in low-frequency passive RFID tags (the tag is enlarged for clarity).

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

RFID Privacy & Security Implementation - Recent topics & Applications in Japan -

K.Srinivasu Ravi 1, Seema Kalangi 2, Veeraiah Maddu 3

Privacy and Security in library RFID Issues, Practices and Architecture

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

System Manual. Intermec RFID

RFIDs and European Policies

RFID Components, Applications and System Integration with Healthcare Perspective

UHF-Technology. Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2014

Originally viewed as essentially remotely-readable

RF Attendance System Framework for Faculties of Higher Education

RFID Applications: An Introductory and Exploratory Study

The Marriage of Passive and Active Technologies in Healthcare. Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

The Art and Science of UHF Passive Tag Design

Efficient Asset Tracking: From Manual to Automated

OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications

Military Usage of Passive RFID 1

Using ISO Compliant RFID Tags in an Inventory Control System

The Research and Application of College Student Attendance System based on RFID Technology

RFID: Technology and Applications

Various Attacks and their Countermeasure on all Layers of RFID System

ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I ERDİNÇ YILMAZ

How To Understand And Understand The Technology Of Radio Frequency Identification (Rfid)

Security in Near Field Communication (NFC)

Security & Chip Card ICs SLE 44R35S / Mifare

Omni-iD white paper the technology of On-metal rfid

Inventory & Location System

IEC and CISPR Standards

Security and privacy in RFID

An Oracle White Paper January How to Track Your Oracle Sun System Assets by Using RFID

The State of RFID Implementation and Its Policy Implications: An IEEE-USA White Paper

Transcription:

Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 18-1

Overview! What is RFID?! RFID: Applications! RFID Tags and RFID Readers! Reader-Tag Coupling! RFID Standards! Security Issues 18-2

What is RFID?! Radio Frequency Identification! Reader queries using RF, ID sends its ID using RF! Competes with Bar Code, Magnetic stripes, Magnetic Ink Character Recognition (MICR) on Bank Checks 18-3

RFID: Applications! Pioneered by British during World War II to identify aircrafts! 1960's US Government started using RFID on nuclear and hazardous materials! Garage door openers use RFID! Implants in human, horses, fishes, animals Animal ID Standards ISO 11784 and 11785 use RFID! Automatic Toll Collection! Access control, Equipment Tracking! All shipments to DoD must be RFID tagged.! Sensor+RFID can be used to monitor products inside sealed shipping containers 18-4

Applications (Cont)! Warranty information on RFID tags! Smart medical cabinets remind patients to take medications and call doctors if missed! Retail loss prevention! No need to unload grocery carts for checkout 18-5

RFID Tags! Tag = Antenna, Radio receiver, radio modulator, control logic, memory and a power system! Power Source: " Passive Tags: Powered by incoming RF. Smaller, cheaper, long-life. Approx range 5m. " Active Tags: Battery powered. Can be read 100 ft away. More reliable reading. " Semi-Passive tags: Transmit using 'Backscatter' of readers' RF power. Battery for logic. Range like passive. Reliability like active. 18-6

! Size: Tags (Cont) " Hitachi mu-chip is 0.4 mm on a side. Designed to be embedded in paper documents. Can be read within a few cm. " Verichip makes tags the size of grain of rice. Designed to be implanted in humans. Identify patients. " Semi-passive RFIDs used in E-Z Pass toll collection are paperback book size. 5-year battery.! Security: " Promiscuous Tag: Can be read by any reader. Most tags. " Secure Tag: Need reader authentication. Usually manual passwords. 18-7

! Components: Tags (Cont) " Simple tags with Serial #. 96-bit block of readonly storage (ROM). " Read-write memory. " Tags may have embedded sensors (tire pressure sensor)! Kill Feature: Special code causes the chip to stop responding.! Multiple tags can interfere Need a singulation protocol Reader interrogates one tag at a time. 18-8

RFID Readers! Sends a pulse of radio energy and listens for tags response! Readers may be always on, e.g., toll collection system or turned on by an event, e.g., animal tracking! Postage stamps size readers for embedding in cell phones Larger readers are size of desktop computers! Most RFID systems use License-exempt spectrum! Trend towards high-frequency Band Frequency λ Classical Use LF 125-134.2 khz 2,400 m Animal tagging and HF 13.56 MHz 22 m keyless entry UHF 865.5-867.6 MHz (Europe) 915 MHz (USA) 32.8 cm Smart cards, logistics, and item management 950-956 MHz (Japan) ISM 2.4 GHz 12.5 cm Item Management 18-9

Reader-Tag Coupling! Passive tags have capacitor to store energy for replying (TDD) " Can respond on another frequency while reader is still transmitting (FDD)! Near-Field = Within a few wavelength Far-field = Beyond a few wavelengths! Low-Frequency (large λ) system operate in near-field High-Frequency and UHF system operate in far-field 1. Inductive Coupling: In near-field " Both Antennas are coils (like transformers) " Reader sends a AM/FM/PM modulated wave. " Tag responds by varying its load on the reader. 18-10

2. Back Scatter: In far-field Coupling (Cont) " Reflecting the energy back. " Tag changes its reflection to respond. 3. Capacitive Coupling: " Charged plates as antennas on readers and tags " Can be easily printed. Chip 18-11

RFID Range! Reading range depends upon the transmitted power, antenna gains, frequency, reader receiver sensitivity.! Affected by the environment: Metal objects (aluminum foil), Water (Wetness, salt water) 18-12

! ISO/IEC JHC1/SC31/WG4 RFID Standards " Automatic Identification and Data Capture Techniques " ISO (International Organization for Standardization) and " IEC (International Electro-Technical Commission) " Joint Technical Committee number one, JTC 1 (ISO/IEC) " Subcommittee SC 31! Electronic Product Code (EPCGlobal) - Industry consortium! JTC 1/SC 17 Identification Cards and related devices! ISO TC 104 / SC 4 Identification and communication! ISO TC 23 / SC 19 Agricultural electronics! CEN TC 278 Road Transport and Traffic Telematics " Comité Européen de Normalisation (European Committee for Standardization) 18-13

RFID Standards (Cont)! CEN TC 23/SC 3/WG 3 Transportable Gas Cylinders - Operational Requirements - Identification of cylinders and contents! ISO TC204 Transport Information and Control Systems! American National Standards Institute (ANSI) X3T6: RF Identification! European Telecommunications Standards Institute (ETSI)! ERO European Radio communications Office (ERO)! Universal Postal Union! ASTM International (Testing Materials) 18-14

! Unauthorized Reading: Security Issues " Competitors can scan closed boxes and find out what is inside " Someone can read your RFID enabled credit card! Unathorized Writing: " Can change UPC/price of an item " Can kill a tag! Solution: Reader authentication. " Passwords can be sniffed. 18-15

Privacy What can you do to prevent others from reading your RFID after you purchase the item?! Kill the tag. Need authentication.! Put the tag to sleep. Used for reusable tags. Libraries. Authentication to put to sleep and to awaken.! Re-label: Customer can overwrite customer specific information. Manufacturer specific information can remain.! Dual Labeling: One tag with customer specific information. One with manufacturer specific information.! PIN: The reader needs to provide a PIN. The user can change the PIN.! Distance-Sensitive: Tag is designed so that the information provided depends upon the distance! Blocker: A device that generates random signal and prevents others from reading your RFIDs. Use aluminum foil. 18-16

Range of Attacks! Nominal reading range: Standard power reader! Rogue reading range: More powerful readers can read from longer distance! Tag-to-Reader Eavesdropping Range: Passively listen to response with a more sensitive receiver! Reader-to-tag Eavesdropping Range: Passively listen to query with a more sensitive receiver. Can do this from very far.! Detection Range: Can just detect the presence of a tag or a reader. Important in defense applications where important weapons or targets are tagged. 18-17

Types of Attacks! Sniffing and eavesdropping: Passively listening with very sensitive readers. Competition can find what you are shipping/receiving! Spoofing: Copy tag for use on other items! Replay: Unauthorized access by recording and replaying the response. Garage door openers.! Denial of Service: Frequency jamming! Blocking: Aluminum foils 18-18

Summary 1. Three types: Passive, Active, Semi-Passive 2. Kill feature, secure and promiscuous tags 3. Low/High/Ultra High Frequency, ISM band 4. Near field and far field 5. Three Couplings: Inductive, Backscatter, Capacitive 6. Wireless security and privacy issues are even more severe with RFID due to limited tag capability. 18-19

Reading Assignment! C. Jechlitschek, A Survey Paper on RFID Trends, http://www.cse.wustl.edu/~jain/cse574-06/rfid.htm! Introduction to Radio Frequency Identification (RFID), http://www.aimglobal.org/technologies/rfid/resources/rfidpri mer.pdf! Radio Frequency Identification, http://www.technology.gov/reports/2005/rfid_april.pdf! How RFIDs Work, http://electronics.howstuffworks.com/smart-label.htm! How Anti-shoplifting Devices Work, http://electronics.howstuffworks.com/anti-shopliftingdevice.htm 18-20