1 / 13

RFID Security

RFID Security. Current Applications. Logistics Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War II: RFID makes supply chain reliable Proctor & Gamble Elimination of dock bottleneck: fast loading of palettes onto trucks

tyme
Download Presentation

RFID Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RFID Security CSE 7349

  2. Current Applications • Logistics • Military supply logistics • Gulf War I: Double orders to ensure arrival • Gulf War II: RFID makes supply chain reliable • Proctor & Gamble • Elimination of dock bottleneck: fast loading of palettes onto trucks • Inventory control (i.e., theft-prevention) • Air Canada • tracking of food carts • Gillette • Tracking Mach3 razor blades • Ordered 3 million • Refining the retail experience • Payment technologies • Exxon/Mobil • Speedpass CSE 7349

  3. Future Applications • Maintaining shelf stocks in retail environments • Tagging pets • Proximity badges for building access • Clothing – anti-forgery, customer returns • Parenting logistics • Water park uses RFID bracelets to track children • “Smart” appliances • Refrigerators that automatically create shopping lists • Ovens that know how to cook pre-packaged food • “Smart” products • Clothing, appliances, CDs tagged for store returns • “Smart” paper • Airline tickets that indicate your location in the airport • Library books • Business cards • Recycling • Plastics that sort themselves CSE 7349

  4. RFID Viability • Expensive tags were OK for high tickets • Price has to go below 0.05$ • A recent purchase involved 500 million tags purchased by retialer • Once viable (as predicted) RFID could be the most widely deployed chip • Promise is to replace the 5 billion barcode scans/day CSE 7349

  5. Basic Components • RFID Tag • Transponder • Located on the object to be identified • RFID Reader • Transceiver • Can read and write data to Tag • Data Processing Subsystem • Connects to reader CSE 7349

  6. Security Issues • Privacy • Business • Personal • Denial of service • Incorrect information • Forgeries CSE 7349

  7. Cost-Security Trade-off • Low cost • Low intelligence (up to 5000 gates) • Low storage (few hundred bits) • Low range (few meters) • Security • AES needs 20-30 thousand gates • Hash such as SHA-1 also needs similar order • TEA algorithm still not feasible CSE 7349

  8. Forward and Backward Channels CSE 7349

  9. Hash-Based Access Control CSE 7349

  10. Randomized Access Control CSE 7349

  11. Anti-Collision Algorithms • Probabilistic • Tags respond in randomly generate times • Slotted Aloha scheme • Deterministic - Binary tree-walking scheme • Space of k-bit identifiers • k-bit identifiers leaves in a tree of depth k • Reader sorts through tags based on tag-ID • Traverses tree asking subsets of tags to broadcast a single bit at a time. • RFID reader broadcasts tag serial numbers over very large distances • May introduce vulnerability to eavesdropping. CSE 7349

  12. Silent Tree Walking CSE 7349

  13. Other Measures • Proactive detection of intruders • Chaffing and Winnowing • Confidentiality without encryption • Deliberate DoS for privacy CSE 7349

More Related