Enabling the secure use of RFID



Similar documents
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

RFID SECURITY. February The Government of the Hong Kong Special Administrative Region

Data Protection Technical Guidance Radio Frequency Identification

Cloud RFID UHF Gen 2

A. Background. In this Communication we can read:

RECOMMENDATIONS COMMISSION

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Scalable RFID Security Protocols supporting Tag Ownership Transfer

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of

Adversary Modelling 1

Radio Frequency Identification (RFID) An Overview

Privacy and Security in library RFID Issues, Practices and Architecture

entigral whitepaper Understanding RFID and Barcode Differences

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

RFID Design Principles

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}

Design for Management Information System Based on Internet of Things

Security and privacy in RFID

RFID BASED VEHICLE TRACKING SYSTEM

Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs

Michael I. Shamos, Ph.D., J.D. School of Computer Science Carnegie Mellon University

How To Understand The Power Of An Freddi Tag (Rfid) System

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

COSC 472 Network Security

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits

An Overview of RFID Security and Privacy threats

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA

CHAPTER 1 Introduction 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title

The Marriage of Passive and Active Technologies in Healthcare. Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari

Radio Frequency Identification (RFID)

Evolving Bar Codes. Y398 Internship. William Holmes

The Drug Quality & Security Act

Time & Access System An RFID based technology

Simplifying IT Management and Data Security with RFID

Typical System Architecture YOU CAN T MANAGE WHAT YOU CAN T MEASURE

WHITE PAPER. ABCs of RFID

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RFID based Bill Generation and Payment through Mobile

RFID Design Principles

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Major Risks and Recommended Solutions

Strengthen RFID Tags Security Using New Data Structure

NOT ALL CODES ARE CREATED EQUAL

A Study on the Security of RFID with Enhancing Privacy Protection

Smart Card Security How Can We Be So Sure?

RFID Security: Threats, solutions and open challenges

Efficient Asset Tracking: From Manual to Automated

Security Issues in RFID. Kai Wang Research Institute of Information Technology, Tsinghua University, Beijing, China

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

SOURCE ID RFID Technologies and Data Capture Solutions

Mobile RFID Applications and Security Challenges

Tracking metal parts with passive UHF RFID. April 2007

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER

Current and Future Research into Network Security Prof. Madjid Merabti

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

RFID and Privacy Impact Assessment (PIA)

HP Brazil RFID CoE Center of Excellence

The Evolving Internet of Things Market

Underground Mine Rescue Equipment and Technology

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results

AAS. Automatic Attendance System. Grant Hornback, Alex Babu, Bobby Martin, Ben Zoghi, Madhav Pappu, Rohit Singhal

White Paper Healthcare Supply Chain Traceability

Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Why Has the Development in RFID Technology Made Asset Management More Urgent?

Tesco: use of IT and information systems

RF ID Security and Privacy

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

IBM WebSphere Premises Server

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

Loyalty Systems over Near Field Communication (NFC)

ITIL A guide to event management

RFID Applications in the Healthcare and Pharmaceutical Industries

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

How To Hack An Rdi Credit Card

RFID Basics HEGRO Belgium nv - Assesteenweg Ternat Tel.: +32 (0)2/ Fax : +32 (0)2/ info@hegrobelgium.

Computer and Network Security

Efficient Data Sharing in Healthcare

Security in Near Field Communication (NFC)

Beyond Retail: The Imperative for Ubiquitous Security in Wireless Printers

Transcription:

Enabling the secure use of RFID BLACK ME/FOTOLIA.com

Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients. Before its full potential can be exploited, it is critical that security surrounding its use is effectively implemented to ensure the data itself is not exploited By Dario Bevilacqua and Keith Mayes RFID technology as a security enabler in the Internet of Things A few years ago, it was hard to believe that physical objects could be connected to the Internet in the same way as a file uploaded to a server, with their own IP addresses, but this is becoming a reality by the development of new low-cost technologies that could easily become widespread. One of the technologies that allows this is UHF radio frequency identification (RFID) technology, which has the advantage of being low cost, but promises computational resources that, in a couple of years, may be adequate to overcome problems linked to information security. In this virtual world, objects become recognisable and acquire intelligence through being able to communicate data about themselves and access information from others. For example, items located in a fridge could talk to the fridge and report their expiry dates or that they are almost finished and so have to be replaced, perhaps by automatic ordering from the supermarket using the Internet. In this case the object needs to be connected to a network. Even people may be connected to the network. For example, in a hospital each patient may have an UHF RFID bracelet that connects him to the hospital s network and in which a chip stores all his medical information. Using the smart bracelet, the doctor might know in real time which patient needs medicine and what the treatment is achieving. Moreover, if the bracelet is integrated with a sensor, such as a heart monitor, the real-time response could help to prevent a possible heart attack. Indeed, the doctor may notice the onset of this attack even before the patient notices it. In this case, it is the patient who is connected to the network. As the example above illustrates, objects and people can interact by being connected to the network. This also allows every object or person to be tracked or identified. This is sometimes called the Internet of Things, or IoT. However, even if UHF RFID technology promises many advances in automation, it is not yet widespread. For example in the supply chain, many retailers still just use barcodes instead of RFIDs. This approach is efficient in terms of its low cost compared with RFID, but is very limited from the point of view of security and efficiency. In fact, barcode technology suffers from the following disadvantages when compared with UHF RFID technology: n Slow scanning of the products: the reader can only read barcodes one at a time and there may be millions of items to be read in a supply chain system; n If a product is in the wrong place, the operator cannot easily identify it. This may lead to errors during the inventory process; n A barcode reader requires a line-of-sight to read each product, making the inventory process less efficient; n A barcode reader can read products only at short distances. Box with UHF RFID label being scanned -2-

All of these disadvantages could be overcome by UHF RFID technology. In fact, it has the following advantages over barcodes: n Many tags can be identified at the same time, promoting speed and efficiency in the inventory process; n Each tag can contain information stored in its chip; n The reading distance for a UHF tag is greater than that for a barcode; n RFID does not require line-of-sight; n RFIDs can support secure cryptographic protocols. Due to these advantages, UHF RFID is a very promising technology that is envisioned to replace barcodes and to be extensively used for inventory management, supply chain logistics and retail operations. In fact, this technology is able to revolutionise the applications of supply chain management and inventory control, improving business efficiency. This technology is able to revolutionise the applications of supply chain management and inventory control, improving business efficiency RFID tags are not just for supply chain; by attaching tags to objects it is possible to perform services for identification, tracking, and localisation, and to provide location-based services. However, the use of this technology creates privacy and security risks. The privacy protection and security of RFID systems is a major challenge for researchers and engineers. Firstly, RFID is commonly a low-cost technology, which does not allow the use of the most powerful processors required to apply efficient, high specification security measures. Secondly, the current scientific literature and RFID standards are still very poor in terms of providing practical security for tagging and logistics, although there is standardisation in this area. EPCGlobal and the International Organisation for Standards (ISO) have defined standards for tags, readers, and protocols to allow communication between them. The latest standard is EPC Class 1 Generation 2 (EPCGen2). The goal of this standard has been to support efficient tag reading, flexible bandwidth use, the ability to read and write tags and, finally, to provide building blocks for basic security, such as a 16-bit Pseudo-Random Number Generator (RNG) and a 16-bit Cyclic Redundancy Code (CRC-16). These developments are welcome, but they are not yet sufficient to satisfy the security and privacy requirements of a generic RFID system. A generic tracking and identification scenario Next we describe our design for a secure identification and tracking system for objects or persons using UHF RFID technology. It requires all the advantages of RFID, but must take into consideration the problems that arise from demands for security and privacy. First of all, it will be assumed that the communication channel between the reader and the back-end server is secure, while the UHF wireless communication channel between tag and reader is potentially accessible to attackers. It is to this latter communication channel that the security protocols must be applied to provide mutual authentication, confidentiality and privacy protection. The UHF RFID system is composed of the following components: n An RFID tag attached to the object to be tracked, identified or connected to the Internet. It is composed of a chip that stores information and security keys and an antenna that exchanges signals with the reader; n An RFID reader that talks to the tag and passes information to the back-end server; n A back-end server that has a MySQL database for dynamically storing tag events of interest; it is accessed by readers to identify and track objects to which tags are attached. -3-

Figure 1: Antenna, reader and tag RFID system with database and middleware system integrated in the computer Open source middleware is deployed between the hardware interface and the software interface to filter the events of interests (see Figure 1). An example scenario consists of three rooms with an item located in each room (see Figure 2). In each room there is a reader, with the job of identifying which items are present in the respective rooms. In Room 1, is Reader 1 and Item 1, Mouse. In Room 2, is Reader 2 and Item 2, PC, while in Room 3 there is Reader 3 and Item 3, Hard Disk. The aim of the readers is to determine the items present in the rooms and update the database with any movement of the items between the various rooms, thereby tracking them. Suppose, for example, that item Mouse is moved to Room 2. Then the reader in Room 1 no longer registers the presence of the object while the reader in Room 2 observes a new object and identifies it as item Mouse. The readers communicate this to the computer database, which update the item s status to show that it is no longer in Room 1, but is now in Room 2. In summary, in this scenario the UHF RFID tags 1, 2 and 3 are attached respectively to the following items: Mouse, PC and Hard Disk; the UHF RFID, Readers 1, 2 and 3 (inclusive of antennas) located in the Rooms 1, 2 and 3, with the aim of recognising the items in the respective rooms; and finally middleware and a MySQL database installed in the back-end server. The output of the implemented RFID system scenario might be as seen in Figure 3. The operator can see that the first event, updated in the database, is that Reader 1, located in Room 1, has identified Item 1 (Mouse) at 15:12:59 on 07/06/2012. A second later, Reader 2, located in Room 2, has identified Item 2 (PC). Another second after that, Reader 1 has again identified Item 1 (Mouse) to be in Room 1 because this item had been moved out of the read range of all the readers and then returned. Reader 3, located in Room 3, has identified Item 3 Figure 2: A scenario for tracking and identifying items deployed in three different rooms Figure 3: Typical MySql database output from Figure 2-4-

(Hard disk) at 15:13:02 on the same day. Two seconds later, Reader 2, located in Room 2, has identified Item 1 (Mouse); this means that Item 1 has been moved from Room 1 to Room 2, and so on. This system is tracking the objects. However, there is no entity authentication, privacy or integrity protection. This would be of concern for sensitive and/ or valuable objects and especially if the tags related to people. Therefore an improved system should satisfy security requirements including mutual authentication, confidentiality and data integrity. TRAP-2.5 as a principal security component of the system Privacy breaches are one of the major social problems about which citizens are concerned To meet the security requirements, first it is necessary to solve the authentication problem by, for example, employing the TRAP-2.5 protocol. This uses mutual authentication, so that any attacker equipment that pretends to be a reader is rejected by the tag, as it does not know the secret authentication key of an authorised reader. The confidentiality problem is solved through the use of pseudonyms exchanged over the wireless reader-tag interface; the pseudonyms can only be mapped to the right EPC code by an authorised database that knows the mapping. Furthermore, by using an EPCGen2-compliant CRC-16 technique, data integrity can be preserved. Thus, Reader 1 and the Mouse item to which was attached the UHF tag, can authenticate each other. Upon successful authentication and identification, the tag will exchange its EPC code, but in pseudonym form in order to preserve confidentiality. At this point, Reader 1 recognises that the item Mouse is in Room 1 and updates the database with this event. In this way the operator can know where the item is located at any time, thereby tracking it. When, the item is ready to leave the RFID system, e.g. it is sold, the operator can use the option KILL present in the TRAP-2.5 protocol, in order to protect the privacy of the consumer by disabling the tag. KILL is password protected and disables the tag s antenna, rendering it inoperative. Today, privacy breaches are one of the major social problems about which citizens are concerned. Privacy attacks come from the fact that, once out of the distribution chain, tags may continue to operate, now as objects in the possession of citizens who are often ignorant of this activity. The potential danger comes from the fact that there might be tracking attacks or social engineering attacks on the possessor of the tag. A further threat could be from the illegal acquisition of data from labels when the goods are in the possession of the citizen; he could have paid for them by credit card thereby connecting his identity with them. The attacker might be able to illegally track items that a person owns for marketing purposes. In fact, it might be possible to interrogate all tags that are attached to a person s clothing and then use this information to create a profile of the person. Other worrying cases include inserting tags into banknotes or identity documents for the purpose of defeating counterfeiting and facilitating checks. The disadvantage of this is the potential for a breach of privacy since, without additional security measures, a malicious user could gain unauthorised access to the tags contained in the notes and find out the amount of money a person is carrying, or information contained in his documents. Some of the methods used to prevent the violation of privacy include: authentication, pseudonyms (a set of identifiers that an RFID tag uses interchangeably), physical tag shielding (to avoid certain undesired reading) and, finally, the use of the KILL function to permanently disable the tag. The TRAP-2.5 protocol was created to preserve information security on the wireless communication channel between the tag and the reader, and to -5-

be compliant with the EPCGen2 standard. TRAP-2.5 uses a 16-bit RNG and 32-bit keys. It provides reasonably strong privacy protection since only authorised and authenticated readers can access the information contained in the tag and thereby identify the tag (by its EPC code) and track the object to which the tag is attached. Also, the tag s EPC code is never transmitted, thus promoting confidentiality, as there is only an exchange of pseudonyms which are updated with every authentication. Furthermore, this updating provides mutual authentication and forward secrecy, as the attacker cannot desynchronise the updating process of the key stored in the tag. In addition, when a tag s key has been compromised, the attacker cannot identify the tag in previous protocol streams as the protocol parameters are pseudo-random. The tag transmits specific pseudo-random parameters to the back-end server. The parameters contain the obscured tag ID and are successfully used by the back-end server to recover the tag ID, even in the presence of active attackers. Conclusion The aim of this article was to describe the design of an RFID system for identification and tracking of items that could be applied in various scenarios (e.g. laboratories and hospitals) and which place an emphasis on information security. The goal was to preserve the integrity, privacy, confidentiality and authenticity of information exchanged in the wireless communication channel between tag and reader. For such a scope, the EPCGen2-compliant protocol TRAP-2.5 was designed recently, and it is used here. It has several advantages compared to other protocols available in the scientific literature, including enabling mutual authentication, preserving privacy, confidentiality and integrity, and being resistant to synchronisation, impersonation, and related-key and exhaustive key-search attacks. TRAP-2.5 enables mutual authentication, preserves privacy, confidentiality and integrity and is resistant to synchronisation, impersonation, and related-key and exhaustive keysearch attacks Since it is compatible with EPCGen2, TRAP-2.5 may already be applied in the radio interface of any RFID system in order to increase the security of the system. In fact, today the biggest problem among various RFID manufacturers is not focusing on the security, only ensuring efficiency and speed of reading. In many cases, the RFID system security is guaranteed only through password access to memory, but there is no authentication between the reader and the tag. So any attacker could impersonate the tag to the reader or vice versa and steal the information exchanged. This could be very dangerous if the information exchanged is sensitive. We have reached a threshold point with EPCGen2 compliant RFID security. The only way to increase security is to provide new security tools which are more sophisticated and powerful and can be integrated not only in RFID hardware but also represented in the standards. Only in this way could RFID technology be used for the exchange and management of sensitive data both in anticounterfeiting and in the Internet of Things (IoT). About the authors Dario Bevilacqua received a B.Eng. in Information Engineering and an M.Eng. in Telecommunication Engineering from the University of Salento in 2008 and 2011 respectively, winning the Ritorno al futuro 2011 award as Best Graduate. A year later, he received his M.Sc. in Information Security from Royal Holloway, and was an exhibitor at the Smart Card Centre Open Day at Royal Holloway. Currently he is working as Senior Security Engineer with AVIVA plc. Professor Keith Mayes received his BSc in Electronic Engineering in 1983 from the University of Bath and his PhD degree in Digital Image Processing in 1987. He has a long career in industry with Philips, Honeywell, Racal and Vodafone, working on many research and development projects. In 2002, Keith was appointed as the Director of the ISG Smart Card Centre at Royal Holloway University of London. Keith is a Fellow of the Institution of Engineering and Technology (IET), a Chartered Engineer, a Founder Associate Member of the Institute of Information Security Professionals, and a member of the Licensing Executives Society. -6-