RFID
This presentation is the property of its rightful owner.
Sponsored Links
1 / 35

RFID PowerPoint PPT Presentation


  • 124 Views
  • Uploaded on
  • Presentation posted in: General

RFID. Technology Applications Risks Security Privacy. RFID Radio Frequency IDentification. Replaces the ubiquitous bar code Electronic Wireless Contains much information Very flexible Very powerful. RFID . NIST SP800-98 GAO Report “Is Your Cat Infected with a Computer Virus?”

Download Presentation

RFID

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Rfid

RFID

  • Technology

  • Applications

  • Risks

  • Security

  • Privacy


Rfid radio frequency identification

RFID Radio Frequency IDentification

  • Replaces the ubiquitous bar code

  • Electronic

  • Wireless

  • Contains much information

  • Very flexible

  • Very powerful


Rfid

RFID

  • NIST SP800-98

  • GAO Report

  • “Is Your Cat Infected with a Computer Virus?”

    • Melanie R. Rieback


Components of an rfid

Components of an RFID

  • Antenna

  • CPU/Chip, i.e. Computer

  • Substrate

  • Chip Reader – Interrogator

  • Middleware – Communications and Database

  • Analytic System


Gillette s razor rfid

Gillette’s Razor RFID

Close to actual size

Chip

Antenna


Rfid what is it small

RFIDWhat is it?Small!


Hitatchi s answer

Hitatchi’s Answer

Human Hair

Tiny Radio Frequency Identification (RFID) chips, 64 times smaller than current devices, have been developed by Hitatchi in Japan. Little bigger than a grain of sand at 0.05 x 0.05mm, the chips come with a 128-bit memory capable of storing an identification number of up to 38 digits


Rfid s

RFID’s

  • Size is about the dot on an “i” or larger

  • Antenna can be up to several inches

  • Usually copper foil

  • Now can be conductive printer ink.

  • When the label is printed the RFID can be printed at the same time with sticky chip attacked


Rfid tag printer

RFID Tag Printer

Tag Printer


Rfid interrogators

RFID Interrogators

  • Hand held for inventory etc.

  • Fixed

    • Can read up to palette load of items

    • Overhead in a toll booth

  • Interrogation distances can be from a few centimeters to many meters

    • Subject to design considerations


  • Hand held interrogator

    Hand Held Interrogator


    Fix interrogator

    Fix Interrogator


    Rfid placement

    RFID Placement

    • On the back of a Label

    • In the spine of a book

    • As part of the item

    • Within the person/animal


    Active rfid s

    Active RFID’s

    • Active RFID’s will have a battery

    • Can have multiple sensors attached

      • Temperature

      • Humidity

      • Impact – Accelerometer

      • Radiation dosimeter

      • Verifies proper shipping/storage specs

  • Used mainly for large shipments


  • Antenna types

    Antenna Types


    Examples

    Examples

    • Passports

    • EPC’s – Electronic Bar Codes

    • Toll Roads

    • Baggage Tickets

      • Later

  • Smart Shelf – Smart Store

    • Later

  • Operating Room Items

  • NAIS

    • Later


  • The smart shelf

    The Smart Shelf

    • Shopper photographed when item is selected

    • Each RFID has a unique ID Number

    • Quantity selected is known

    • Items are tracked throughout the store

    • Theft risk assessment is made

    • At checked out undeclared items are known


    Gillette s razor rfid1

    Gillette’s Razor RFID

    Close to actual size

    Chip

    Antenna


    Rfid

    NAIS

    • National Animal Identification System

    • “Recommended” by USDA

      • States are the enforcers

      • State by state data bases

  • Non-compliance fines up to %5,000 per animal

  • Purpose

    • Track disease

    • Feed lots are exempt

  • Recommending Committee

    • Agri-Business

    • Chip Companies


  • Risks

    Risks

    • RFID

      • Corruption/Compromise

        • RFID chip

        • Middleware

        • Data Bases

  • Interrogator

    • Impersonator

  • Middleware

  • Analytic System


  • Security

    Security

    • RIFD corruption

      • Baggage routing exploit

        • “Does your cat have a virus?”

  • Backend database compromise

    • Subject to the latest vulnerabilities

    • Subject to the latest exploits

  • Evesdropping

    • Passports in an Airport

    • Redesign


  • Virus infection

    Virus Infection

    • Scenario

      • Baggage check in at the airport

      • Each bag gets an RFID

        • These RFID’s are printed at the check in counter

        • Routing info

      • All baggage handling equip read the RFID

      • Route correctly

  • A Bad RFID is put on the bag

    • This one corrupts the routing data base

      • SQL Injection vulnerability


  • Virus infection1

    Virus Infection

    • When the bad RFID is read the data base is corrupted

    • All new tags will have the same virus

    • As the tags move through the system all routing DB’s will become corrupted


    Privacy

    Privacy

    • Evesdropping

    • ID Association

    • Personality Profiling

    • Life Style Profiling


    Privacy evesdropping

    PrivacyEvesdropping

    • RFID contains personal information

      • Could be compromised

        • One card at a time

  • RFID contains serial number to a data base

    • Fairly secure from evesdropping

    • However

      • If the data base is compromised then the entire system is compromised


  • Privacy id association

    PrivacyID Association

    • A RFID is associated with you

      • Your credit card is associated with you and you have aand RFID on your clothing.

      • Your activities are tracked

      • In a smart store all of the merchandise you look at is logged.


    Privacy personality profiling

    PrivacyPersonality Profiling

    • Shopping history

    • Travel patterns

    • Profiling is based on an RFID assigned to you

      • Credit card

      • Smart card

      • etc.


    Privacy life style profiling

    PrivacyLife Style Profiling

    • RFID tracks

    • Cell phone travels

      • Tower by tower

      • GPS

  • Credit card purchases


  • Login