RFID System: Design Parameters and Security Issues



Similar documents
Strengthen RFID Tags Security Using New Data Structure

A Study on the Security of RFID with Enhancing Privacy Protection

Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols

RFID Security: Threats, solutions and open challenges

Enabling the secure use of RFID

RFID Security and Privacy: Threats and Countermeasures

An Overview of Approaches to Privacy Protection in RFID

Privacy and Security in library RFID Issues, Practices and Architecture

PAP: A Privacy and Authentication Protocol for Passive RFID Tags

Tackling Security and Privacy Issues in Radio Frequency Identification Devices

RFID BASED VEHICLE TRACKING SYSTEM

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Various Attacks and their Countermeasure on all Layers of RFID System

Back-end Server Reader Tag

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

RFID SECURITY. February The Government of the Hong Kong Special Administrative Region

Security Issues in RFID. Kai Wang Research Institute of Information Technology, Tsinghua University, Beijing, China

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

On the Security of RFID

Evolving Bar Codes. Y398 Internship. William Holmes

A Research on Issues Related to RFID Security and Privacy

WHITE PAPER. ABCs of RFID

A Survey of RFID Authentication Protocols Based on Hash-Chain Method

Security and privacy in RFID

How To Understand The Power Of An Freddi Tag (Rfid) System

An Overview of RFID Security and Privacy threats

Radio Frequency Identification (RFID) An Overview

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Information Security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

RF ID Security and Privacy

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

CPSC 467b: Cryptography and Computer Security

Security Requirements for RFID Computing Systems

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Security in RFID Networks and Protocols

The Study on RFID Security Method for Entrance Guard System

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

Secure and Serverless RFID Authentication and Search Protocols

Content Teaching Academy at James Madison University

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Automated Identification Technologies

COSC 472 Network Security

An Introductory and Elementary Study on RFID & Its Applications

Cloud RFID UHF Gen 2

LibRFID: Automation Software for Library Management System Using RFID Technology

Radio Frequency Identification (RFID)

Chapter 23. Database Security. Security Issues. Database Security

CHAPTER 1 INTRODUCTION

Security, Privacy, Authentication in RFID and Applications of Smart E-Travel

SECURITY IN LOW RESOURCE ENVIRONMENTS

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Security in Near Field Communication (NFC)

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

A Secure and Efficient Authentication Protocol for Mobile RFID Systems

The Misuse of RC4 in Microsoft Word and Excel

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

How To Write A Transport Layer Protocol For Wireless Networks

Single Sign-On Secure Authentication Password Mechanism

ABSTRACT. Keyword: - RFID, unauthorized transaction, security. Vol-1 Issue INTRODUCTION 2. RFID SYSTEM

The Place of Emerging RFID Technology in National Security and Development

Using RFID Techniques for a Universal Identification Device

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

A Secure RFID Ticket System For Public Transport

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

A Brief Survey on RFID Privacy and Security

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

ITL BULLETIN FOR AUGUST 2012

Securing MANET Using Diffie Hellman Digital Signature Scheme

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

Protecting the privacy of passive RFID tags

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Wireless Sensor Network: Challenges, Issues and Research

Wireless Network Security

International Journal of Engineering Research & Management Technology

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

The Research and Application of College Student Attendance System based on RFID Technology

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

Identifying Data Integrity in the Cloud Storage

Dynamic Query Updation for User Authentication in cloud Environment

The Development of a Web-Based Attendance System with RFID for Higher Education Institution in Binus University

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Transcription:

World Applied Sciences Journal 23 (2): 236-244, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.23.02.171 RFID System: Design Parameters and Security Issues 1 1 2 Meena Nawaz, Jameel Ahmed and Umar Mujahid 1 Department of Electrical Engineering, HITEC University, Taxila-Cantt, Pakistan 2 Department of Electrical Engineering, Bahria University, Islamabad, Pakistan Submitted: Apr 28, 2013; Accepted: Jun 10, 2013; Published: Jun 10, 2013 Abstract: Radio Frequency Identification (RFID) is a technology that automatically identifies the objects in its vicinity by incorporating readers, tags and backend servers all together, forming a system that has been proved to be a versatile system having applications in many areas, a lot has been revealed and rest is yet to be explored. As RFID is that new paradigm which is very vulnerable to unauthorized attacks thus strict security measures have to be adopted. Laws have been made whose violation may result in total chaos only. The system using RFID needs proper and efficient scanning. RFID technology is mainly evidently foreseeable due to low cost RFID tags but sometimes cost is paid in the form of compromised privacy. Within less than a decade, quite a number of research papers that happens to deal the security issues RFID technology is facing, have appeared. In this paper we attempt to summarize current research works that has been done in the area of RFID security right from where it started and some of their open issues are also discussed. The paper is finally concluded with some suggestions for future work. Firstly, we outline some of the research work done so far, security risks faced to RFID and then we review some of the major applications of RFID. Key words: RFID Security Tag Readers Cryptography Denial of Service INTRODUCTION In Section II, we consider related work so far and then we consider security threats in section III. Section IV RFID systems, the Tags which are generally attached includes some of the applications then the paper is finally to objects or people and reader keeps interrogating the concluded in the section V and references in the end. nearby tags via RF waves. The RFID tag is one of the major components of RFID system, reply the queries with Related Work: RFID which is short form for Radio their IDs or any other information stored in it. The way Frequency Identification makes use of radio interface to this interaction occurs, however, raises an apprehension identify physical objects automatically [1]. of security to RFID systems. Inside the interrogation In 1930 s, USA Navy and Army were eager to find range, any reader can recover the information; sometimes some novel ways in order to identify their targets at sea, it can be insightful and private data as well, from the tags. on grounds and in the air. During World War II, in order A malicious reader in the vicinity is able to access the to differentiate its own plane from the plane of enemy, undisclosed information stored in the tags which must not allied were interested in developing an identification leak out, secret information. It can be in the form of system, which they did in the form of Identification personal information/data related to customers, it can be Friend-or-Foe aka IFF system. his health condition or the items purchased by them, can The era of 1950s was generally dedicated to research be revealed by the purchased pharmaceutical and etc. labs and particularly to military. With the arrival of more Moreover, the location of the tags can be found by their compressed and cost-effective technologies, for example emitted information, making themselves prone to the the microprocessor and ICs, RFID systems emerged. tracking attack. These are the drawbacks of the system During the time of late 1960s and 1970s companies which could be exploited by an adversary to abuse users introduced new uses for RFID applications which are privacy significantly. Rest of the paper includes the more widely used but less complicated in nature. The classification of the RFID tags and the problems of most renowned application is EAS equipment which is privacy and authentication to RFID based systems. abbreviation of Electronic Article Surveillance, for the Corresponding Author: Meena Nawaz, Department of Electrical Engineering, HITEC University, Taxila-Cantt Pakistan 236

stock item s protection such as clothing in department stores. Three main components of RFID are: Tags, Readers and Back-end server which carries databases associate with tag data fetched by the readers. World Appl. Sci. J., 23 (2): 236-244, 2013 Parameters of RFID System TAGS: Tag is that component of RFID system which has the role same as the transponder, working transmitter and responder at the same time. It carries the data which is being transmitted between tag/reader. The construction of a tag is in such a way that it comprises of an Integrated Circuit which contains an antenna and is capable of Fig. 1: Transmission between RFID tag reader and storing information in its memory. A tag is capable of back-end system performing some basic tasks like writing or reading data from its memory. The data stored in it is retrieved and RS232 or RS485 are the interfaces that are responsible transmitted to reader whenever a tag lies in an for exchanging data between the control unit and the interrogation area of the reader. software. Other interfaces which can be used are Ethernet Generally, there are three types of tags [1, 2]. (TCP/IP), WLAN, Bluetooth and Zig Bee. Frequency ranges includes low frequency 125 MHz, high frequency Active tag 13, 56 MHz and ultra high frequency 868 MHz. Passive tag RFID however is surrounded by various security Semi-active tag concerns. This section discussed further describes some of the important proposed approaches dealing with the An active tag gets power from the power source it privacy problem. possesses, typically in the form of battery. It is needed to make the chip work and to transmit the data to the reader. Sleeping TAG Approach: From all the important A passive tag is the type of tag that does not have a approaches for the safety of consumer privacy in order of battery; they are capable of using the energy which is simplicity, killing RFID tags of purchased items at the induced by electromagnetic wave emitted from the reader, point of purchase is very helpful [3]. The commands used as a result of this the chip is powered up and the data is to kill tags can be a slow procedure and the whole transmitted back to the reader. operation may be time-consuming that kills the tag Another type of tags is, semi-active, or semi-passive. individually physically, perhaps either by making the It depends on manufacturer s will, consists of an onboard antenna connection un-available or by short-circuiting a battery. The only usage of the battery in this type of tag fuse. is operating the chip. It also makes use of the energy in Auto-ID center, 2000 is the center that builds killing the electromagnetic field like passive tags, to awaken up properties for tags. It supports the tags having kill or drive the chip and to ensure the transmission of data to properties where every tag holds a unique password reader. These tags are also known as Battery Assisted having 8-bit length, upon receiving the password the tag Passive aka BAP [1]. erases itself. This whole process has been proved to be useful in protecting the user privacy to great extent, a Readers: Another component of RFID system is reader, conscious decision however is required to select a time works as interrogator, has the analogous working for the procedure to get off. principle as a barcode reader, whose function is reading data that an information carrier possesses. One of the Blocking TAG Approach: Another proposed approach is main differences between them is that the barcode reader given by Juels, Rivest and Szydlo (JRS) [4]. In the scheme has the ability of reading one barcode at the time and also a new way of protecting user privacy is proposed by some line of sight is required for it. An RFID reader on the selective blocking by blocker tags in which they other hand has capability of reading multiple tags that lie represented it as call blocking. A blocker tag is within the reading range (depending on frequency range) supposed to be a RFID tag of a unique kind preventing at the same time. unwanted scanning of tags mapped into the privacy zone. 237

Fig. 2: RFID Environment JRS suggest in their paper that the tag will be blocked approach suggested by Inoue and Yasuura is relabeling instead of sleeping or killing. Doing so, the modifiable bit by splitting the tag s permanent ID into two parts i.e. the of blocker tag available at sale point, is flipped to 1 making object has been issued a partial ID sequence and the everyone else stop scanning the tag. other part has the ID that is assigned by user. Implementing these approaches, the uniqueness of ID is Soft blocking Approach: Another blocking approach under full control of users locally or globally, hence they becomes part of interest when Juels and Brainard (JB) [5] are in power of enabling tag ID s private or public ones carried out a research and put forward a blocking scheme whenever they are required. which they name soft blocking. Instead of snooping with singulation only, software modules can be involved Tag Re-Encryption Approach: Motivation behind this making balance characteristically much better than the approach is to make system secure by utilizing reordinary regular blocker and soft blocking tag does that. encryption. In this ciphertexts apparently look modified In a nutshell, soft blockers keep RFID readers aware of only while the plaintexts underneath remains unchanged privacy preferences of their owners. i.e., the encrypted serial numbers, remain the same. Juels and Pappu (JP) [8] make use of re-encryption Relabeling Approach: Relabeling the tag identifier is approach in order to provide a solution of consumer another approach where the exclusive identifier of the tag privacy-protection. The employed scheme is based on a identifying the tag, is labeled again with new exclusive random public-key cryptosystem having a single pair as identifier this time but the already there is not removed in a key. A private key or secret key SK and a public key PK order to use it further. Based on this relabeling idea a lot are generated by proper law enforcement agency. The JP of work has been done like Good et al. [6] who proposed system RFID tag holds an exclusive identifier S. The the relabeling scheme by rewriting RFID tags with a new encryption of S is done under Public Key as a ciphertext number that is totally random, every time a checkout C ; which is emitted by RFID tag. And this C can only be occurs. This idea is most applicable in libraries where decrypted by the law enforcement agency to decrypt S. secret scanning is done based on this approach. Inoue Proposed scheme shows that the ciphertext are reand Yasuura (IY) [7] imply two relabeling RFID tag encrypted periodically. The need for re-encryption reader approaches. makes JP system very huge. However it obligingly gives Masking the permanent ID of the tag is one of them, the concept that cryptography can boost privacy of in this approach the permanent ID is rewritten by a private RFID-tag to a great extent even when tags are not able of ID that is composed of user s own choice. The other performing cryptographic operations themselves. 238

Minimalist Cryptography Approach: Cryptography proved to be an efficient approach ensuring consumer privacy. In this minimalist approach the readers can not only re-label the tags even when the tags can re-label themselves. "Minimalist cryptography" in RFID tags that is, accomplishment of the cryptography aims under the consideration of RFID s special constraints. The Proxy Approach: Consumer privacy protection is the factor that is generally not present in RFID readers and tags. So, one way out left is to depend on the reader for protecting the privacy, the concern that the reader might not be safe however, might be the reason as it is public, it will be risky depending on reader. Another complimentary way is carrying their own devices of privacy-enforcement for RFID systems. Using this approach numerous systems have been proposed by researchers. Rieback et al. [9] propose device, called an RFID Guardian. The RFID Guardian is a podium that has ability of providing RFID security at centralized level and individual level privacy management. Four different policies for security are included in it, i.e. Auditing, Access controls and key management efficiently and like RFID firewall, act as Mediator between RFID readers and RFID tags. Refresh Privacy Approach: A novel concept of Refresh Privacy is presented for Privacy Preserving Authentication schemes. The achievement of this scheme is that it has reduced the gap that lies between security model and practically implemented Privacy Preserving Authentication schemes. On the Bases of Refresh, L. Lu et al. [10] propose an analyzing methodology for consumer privacy analysis formally. Another demonstrated PPA scheme in this research is LAST which is also based on this Refresh model. The proposed scheme has capability of achieving privacy and is highly competent with a moderate authentication complexity. Formal privacy model has been categorized in two ways, models that are based on cryptography and the models that are not based on cryptography. The work that has been carried out in the category of non-cryptography based tags is for economically lower cost tags which are not capable of performing some of cryptographic operations, which includes hash function computation, pseudo-random number generation and symmetric-key encryption. Cryptographic operations help tags share their private information with the legitimate reader. The adversaries hold the same information about tags that is carried by legitimate readers. Efficient Missing Tag Detection Approach: Automated warehouse management has many RFID applications including monitoring of tags and detection of missing tags. If any tag is missing, there is a fair chance that the objects caring these tags are also not present at their places, due to administrative or theft error. Work done previously relating this problem has basically infesised on protocols that decrease the time required for execution efficiently avoiding interruption of inventory operations executing normally. The problem of detecting a tag that is missing in such a way that factor of energy is considered is very important when active tags that make use of battery for powering are used. Hao Han et al. [11] proposed a solution that addresses the limitations of the intermediate protocol in the previous research. The protocol is executed by RFID reader, who does this by broadcasting a polling request. As the RFID tag receives the polling request, it is its responsibility that it has to decide whether to participate in polling or not. Each tag takes this decision with a sampling probability p. If the decision taken is to participate, randomly a slot will be selected to respond in the successive frame. If the decision taken by tag is against participating in polling, it goes to sleep until the time scheduled for waking up comes. All these decisions are taken pseudo-randomly and they are predictable by the reader reading them. The IDs of all tags are deposited at reader, from where it can derive all information required for knowing the schedule of tags participating in the polling and, at the position of slots at which they will transmit. Hence, the knowledge of exact details of busy slots and empty slots in the frame is required by reader. At the end of the frame, if the reader finds that an empty slot that was predicted as busy earlier, it is sensed that the tag(s) that is likely to be transmitted in that particular slot must be missing. In this case, reader is responsible for reporting a missing-tag event. When the coverage is tend to exceed multiple readers are used which are synchronized with each other, so if any one reader of these multiple readers finds and reports a busy slot all of them treat that slot as a busy slot. Efficiently Counting RFID Tags Approach: One significant problem that RFID system is facing is making correct and efficient estimate of different tags in RFID systems quickly without even reading each tag separately. This problem becomes of great importance when it comes to applications dealing with monitoring and privacy preservation mostly in real-time scenarios. 239

Non-Repudiation: The last important attribute is that there should be no denial by the sender of a message later having sent it and this should be verifiable independently by any third-party without knowing the message contents. Privacy is the most significant issue in the implementation of RFID system. RFID tags act in response to interrogation by reader without making the owners and bearers alert. Resulting in easy tracking of location and privacy whenever read range is allowable. Even though, some algorithms based on cryptography are implemented, but still any person holding a RFID tag is easily traceable. The risk becomes even greater if the serial number is joint with personal information of a Fig. 3: Authentication phase person carrying RFID tag. RFID suffers from the following security threats [13]: W. Luo et al. [12] presented a scheme dealing with tag population estimation anonymously and efficiently. Cloning of Tags: On querying RFID tag, it emits an The main idea behind the scheme influences the exclusive number called Electronic Product Code aka EPC, very first reply position in a frame in which tags are to RFID reader. An attacker has the ability of scanning arranged in the form of group. It is a fresh estimating many tags simultaneously and producing cloned tags, scheme in which the estimation is done anonymously also which emit exactly the same EPCs he has collected. EPC does not consider collecting the tag s ID in an RFID global is basically the organization that is a recognized system and is capable of calculating the number of tags well-known organization and is behind the EPC global approximately in a precise manner. In the proposed Network for making it established real time application scheme, scanning of whole frame is not required. Instead, standard, automatic information recognition in the supply the only requirement for the reader is identifying the first chain. EPC global has different standards for different slot that is not empty and the total number of successive frequency bands, as it holds for 13, 56 MHz and 865-930 slots that are empty before that non-empty slot is used in MHz [1]. EPC global basically describes the technical estimating the correct number of tags. Again, the lesser protocol describing the structure of the data on the tag the number of empty slots appear before the first non- and the data that is being communicated between tag and empty slot, the more the number of tags there are. reader. Generally, attaining an accurate and precise estimation requires performance of quite a certain number of Privacy Incursion: Electronic Product Code number is iterations of such operations. although unique for each tag yet an enemy can identify and can easily track tags carried by people having these Security Issues: Security objectives or attributes can be EPC. one or more of the following: [13] Denial/Disruption of Service: If several numbers of fake Confidentiality: The privacy of the exchanged data tags and even malicious readers are deployed, employed between two communicating parties must be maintained. resources can be mistreated and disruption of service may b. Authentication: The source of an originating message happen, including interference with radio communication. from transmitting party can be verified by the receiving Like the malicious reader will keeps reader/tag busy, party. making it unavailable to authentic reader most of the time affecting the efficiency. Integrity: The originality of the exchanged message must be maintained by communicating parties. This guarantee should be provided that the received message was not altered in transit. Location-Based Attacks: Generally location-based attacks are known as mafia or fraud attack which is a man-in-the-middle type relay attack. 240

Table 1: Analysis of threats faced by RFID system design of new primitives, analysis of the security of new primitives and proficient implementation of primitives that are already existing, has slowed down the development of lightweight cryptographic protocols to a great extent. Pseudorandom number generators aka PRNG also participate crucially in the security of all cryptographic protocols for RFID tags. Yet, almost no work has focused on the design and analysis of a pseudorandom number generator for RFID tags. Terrorist attack is actually a variation of mafia fraud attack, where an attacker can team up with a false party involved in a protocol. The attacker simply relays messages between two honest parties involved in a protocol and makes them believe they are in close immediacy. Thus the integrity of the information is compromised. Side Channel Analysis: In the near future, side channel analysis potentially is going to be the most serious threat to RFID tags, which requires implementation of cryptographic functions. Typical side channel information may include timing information, computation fault, power consumption and electromagnetic radiation that may depict secret information stored in RFID tags for the analysis. Cryptographic Approach: A large body of work in RFID privacy is mainly concerned with lowering the needs for cryptographic functions implemented on RFID hardware, such as the work carried out by Feldhofer, Dominikus and Wolkerstorfer [14] on using cryptographic algorithm AES or by using elliptic curve cryptography [15]. Limited hardware capability of standard EPC global tags is the factor that makes a point of concern for many researchers and they provide algorithms that only depend on simple XOR operations [16] or the presence of a random number generator. While more general-purpose cryptographic protocols can be designed utilizing several techniques and tools; it is relatively tougher designing lightweight cryptographic protocols. Due to the limited study on lightweight cryptographic primitives including Applications of RFID: RFID is vastly applicable in many areas it is very versatile technology. With the passage of time new areas are emerging where its deployment is very useful. A lot of applications of RFID are predictable to be seen in near future. Some of its major applications are: Localization is the area where RFID systems are widely used; they hold the capability of localizing a vehicle placed in shipping yard of a plant where assembly of automobiles takes place. In another application, localization of objects is made accessible by using RFID system that is based on internet [17]. Vehicles already mounted with RFID systems saves the time and much of traffic trouble, as these vehicles pass through the toll; RFID readers electronically take the toll fee automatically [21]. Personal IDs or vehicles mounted with RFID systems are made to enter or leave any place making them authorized for some secure zone where no one can enter without permission [20]. Packaging house is the place where RFID systems are implemented very successfully. To make it more scalable RFID is used in grouping with resource planning projects [19]. Manufacturing goods are equipped with RFID tag in order to track their positions on different steps of processing getting clear picture about them for analysis. The efficiency of hospital systems can be improved by implementing RFID and resources can be saved as well. Hospital equipment is attached with RFID tags making their tracking possible; also files having patient s data are equipped with RFID improving objects traceability [26]. Other medical parameters that are made traceable include heart rate [19]. RFID tag can make a simple drug bottle special by linking its characteristics with information and storing it. Thus it changes its color if it detects any counterfeiting, when the reader scans it, it automatically compares the information it has got with the data already stored [25]. 241

of storing the digital records of visitors that visited recently. The ultimate goal is to enhance security level, control immigration efficiently by reducing frauds [21]. In Airline industry, delivery of baggage is made possible by packaging and delivery service. RFID technology can make this process more dynamic by identifying packages, recording the information and providing methods to make it better [20]. CONCLUSION Fig. 4: RFID Badge and Security System The RFID technology is a new paradigm that holds applications in many areas including proportions from In Chile 2004, during a route to Miami traveling anyplace, anytime, providing connectivity for through plane and boat temperatures of blueberry cases anything and for anyone, the technology however is needed to be tested on route. Both the blueberries are faces many issues relating to the RFID infrastructure, inserted with RFID tags and, temperature is recorded their resolution is needed. As RFID becomes more every 5 minutes. Hence, RFID is useful for temperature persistent, it has proven itself an ultimate technology testing also [22]. enabling an identifier which is unique for each object RFID has most useful applications in supply chains. making an object readable even at a distance making Supply chains deal with a step sequence while the available real time automatic identification and object checking of tags is done by checking readers. They localization on individual level. Removal of some airhave the responsible of cooperating with tags for interface threats however, is required convincingly to get insurance that the tags are following right track [23]. A removed that the RFID system is facing. RFID technology better alternative has been provided in the form of RFID is great when it comes to its usage for keeping stock of tag for the technologies which are used traditionally such items or tracking animals but when we make this as image recognition and barcodes systems while tracking technology applicable to humans, the usage should be and moving containers [24]. RFID can provide traceability done under certain rules, laws and regulations to efficiently, this can enable the retailer to keep track of administrate the operation of the technology and strong items moved and when they have to move, they can close enforcement or check that the fulfillment is made ensured door whenever they want and can activate alarms as it can be so easily exploited if in wrong hands. People s [25].Harmful material can be buried in cargo ships by insecurities and concern about the technology are highly terrorists. An active RFID tag equipped with battery important and they need to get abolished before which is rechargeable helps in labeling and tracking each accepting the RFID technology properly. Thus, for RFID container globally by using wireless security parameter technology enabling the RFID and meeting the computing configurations and Global Positioning System (GPS). So, expectations that are persistent and ubiquitous, issues the information center gets the information if the container will be required to get resolved whether they are social or is experiencing intrusion or parked in un-authorized area technological. [25]. Library is another place where the deployment of REFERENCES RFID tags can be proved very useful to keep track of the books, it can be attached to the books existing in library 1. Thesis report on security issues in RFID, and also, each library card has RFID tag mounted on it, http://www.online.kth.se/thesis/files/thesis_ver_0 doing so the book tracking will be easier. The idea of the 2.pdf. next generation passport is not much different from that, 2. Pateriya, R.K., 2011. Sangeeta Sharma, RFID chip is mounted on each passport. This chip the evolution of RFID security and privacy, comprises of the biometric data and digital information of International Conference on Communication Systems person owns this passport [21]. The chip is also capable and Network Technologies. 242

3. Juels, 2006. Rfid security and privacy: A research 15. Feldhofer, M., S. Dominikus and J. Wolkerstorfer, survey, IEEE Journal on Selected Areas in 2004. Strong authentication for RFID systems using Communication, 24(2): 381-394. the AES algorithm. In Marc Joye and 4. Juels, R.L. Rivest and M. Szydlo, 2003. Jean-Jacques Quisquater, editors, Workshop on The blocker tag: Selective blocking of RFID Cryptographic Hardware and Embedded Systems tags for consumer privacy, in Proc. th 8 ACM {CHES 2004, volume 3156 of Lecture Notes in Conf. Comput. Commun. Security, V. Atluri, Ed., Computer Science, 357{370, Boston, Massachusetts, pp: 103-111. USA, IACR, Springer. 5. Juels and J. Brainard, 2004. Soft blocking: 16. Batina, L., J. Guajardo, T. Kerins, N. Mentens, Flexible blocker tags on the cheap, in Proc. P. Tuyls and I. Verbauwhede, 2006. An elliptic curve Workshop on Privacy in the Electronic Society, processor suitable for RFID-tags. Cryptology eprint S.DeCapitani di Vimercati and P. Syverson, Eds., Archive, Report 2006/227, 2006. Available from: pp: 1-7. eprint. iacr.org/2006/227.pdf. 6. Good, N., J. Han, E. Miles, D. Molnar, D. Mulligan, 17. Langheinrich, M., 2007. RFID and privacy. L. Quilter, J. Urban and D. Wagner, 2004. In Milan Petkovic and Willem Jonker, editors, Radio frequency identification and privacy Security, Privacy and Trust in Modern Data with information goods, in Proc. Workshop on Management, pages 433{450. Springer, Berlin Privacy in the Electronic Society-WPES, S. De Heidelberg New York. Capitani di Vimercati and P. Syverson, Eds., 18. Singh, K. and G. Kaur, 2012. Radio Frequency pp: 41-42. Identification: Applications and Security Issues, 2012 7. Inoue, S. and H. Yasuura, 2003. RFID privacy using Second International Conference on Advanced user-controllable uniqueness, in Proc. RFID Privacy Computing and Communication Technologies. Workshop. 19. Arun M. Nambiar, 2009. RFID Technology: A Review 8. Juels and R. Pappu, 2003. Squealing Euros: of its Applications World Congress on Engineering Privacy protection in RFID enabled banknotes, and Computer Science, pp: 1-7. in Proc. Financial Cryptography, R.Wright, Ed. New 20. Ahsan, K., H. Shah and P. Kingston, 2010. York: Springer-Verlag, 2742, Lecture Notes in RFID Applications: An Introductory and Exploratory Computer Science, pp: 103-121. Study International Journal of Computer Science, 9. Rieback, M., B. Crispo and A. Tanenbaum, 2005. 7(1): 1-7. RFID Guardian: A battery-powered mobile device for 21. Xiao, Q., T. Gibbsons and H. Lebrun, 2009. RFID privacy management, in Proc. Australasian RFID Technology, Security Vulnerabilities and Conf. Inf. Security and Privacy, C. Boyd and Countermeasures Supply Chain the Way to Flat J.M. González Nieto, Eds. New York: Springer-Verlag, Organization, Publisher-Intech, pp: 357-382. vol. 3574, Lecture Notes in Computer Science, 22. Robert, J. Mockler, J. Hayes and Marc E. Gartenfield, pp: 184-194. 2010. RFID and its Applications in Management 10. Lu, L., Y. Liu and X. Li, 2010. Refresh: weak E-Leader Budapest, pp: 1-17. privacy model for RFID systems, in proc of IEEE 23. Ouafi, K. and S. Vaudenay, 2009. INFOCOM. Pathchecker: An Application for Training Products in 11. Han, H., B. Sheng, C. Tan, Q. Li, W. Mao and S. Lu, supply Chains workshop on RFID Security, 2010. Counting RFID tags efficiently and Belgium, pp: 1-14. anonymously, in proc of IEEE INFOCOM. 24. Cheng, Z. and C. Wensheng, A Study on Application 12. Luo, W., S. Chen, T. Li and S. Chen, 2011. of RFID to Container Transportation System efficient missing tag detection in RFID systems, http://www.seiofbluemountain.com/upload/product in proc of IEEE INFOCOM. /201002/12650152 755oia667x.pdf. 13. Duc, D.N., H. Lee, D.M. Konidala and K. Kim, 2009. 25. Rida, A., R. Vyas, T. Wu, R. Li and M.M. Tentzeris, Open Issues in RFID Security. 2010. Devlopment and Implementation of Novel UHF 14. Langheinrich, M., 2008. A survey of RFID Privacy Paper-Based RFID designs for Anti-Counterfeiting Approaches. and Security Applications IEEE, 71: 52-56. 243

26. Fosso Wamba, S. and A. Wicks, 2010. 27. Liu, L., Z. Chen, L. Yang, Yi Lu and H. Wang, 2010. RFID Deployement and Use in Dairy Value Chain: Research on the Security Issues of RFID-based Applications, Current Issues and Future Research Supply Chain, in the proceedings of IEEE Directions IEEE International Symposium on International Conference on E-Business and Technology and Society, pp: 3-9. E-Government. 244