Presentation is loading. Please wait.

Presentation is loading. Please wait.

Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.

Similar presentations


Presentation on theme: "Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar."— Presentation transcript:

1 Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar

2 Introduction  Automatic Identification method for storing and retrieving data remotely  Small object which is embedded inside a person, animal or any product  A silicon microchip mainly Integrated Circuit attached to Antenna for Transmitting and receiving of data.

3  RFID reader wirelessly communicate with the tag to retrieve information  The Reader and tag communicates with each other through Radio Frequency Introduction (continue…)

4 RF Subsystem  RFID Tags - Electronic device Affix inside any object. - Each Tag has Unique Identifier. - Has memory, environment sensors and security mechanism.  RFID Readers - Communicates with RFID Tags  RFID Tags and Readers are 2 way communication.

5 RFID Tag Characteristics  Identifier Format - Uniquely identifies tags - Data Format used is Electronic Product Code. - Four data fields HeaderEPC Manager IdObject ClassSerial Number Specifies EPC type Uniquely Define the organization responsible Uniquely identifies class object Uniquely identifies instants of class object

6  Power Source 1. Passive: - Has no internal power supply - Incoming radio frequency gives enough power to CMOS IC to power up - Antenna is designed to collect power. RFID Tag Characteristics (Continue)

7 2. Active - Has own internal power source - Uses for high power source, in water and may have sensors 3. Semi Passive - Has battery but only powers the IC and does not help in transmitting any signal - Usually stores energy RFID Tag Characteristics (continue)

8 RFID Security Controls  RFID Usage Policy - Authorized and Unauthorized use of RFID  Minimizing sensitive Data Stored on Tag  HMAC  Tag Memory Access Control  Encryption of Data

9 Authentication  Assurance of identity of an entity at other end  Secret Key or Public key Cryptography is used  Public key Cryptography is more preferable since there is no key exchange and public key is transfer through digital signature  Two methods - Zero Knowledge Protocol - Challenge Response Protocol

10 Challenge Response Protocol  Reader sends challenge to the RFID tag  The challenge is encrypted public key made from private key  RFID Tag decrypts the response with its on private key and result is same along with sending a response to the Reader  RFID Tag has EPROM memory to store the private key with microcontroller to process the request.

11 RFID TAG With Authentication Mechanism Challenge Response Protocol (continue)

12 Protocol Implementation Challenge Response Protocol (continue)

13 Applications  Tracking goods during supply chain and manufacturing process.  Controlled access to building or network  Scanning objects  Payment systems  Airline passenger and baggage tracking made practical and less intrusive  Authentication systems already in use (key-less car entry)

14 Types of Attack Spoofing Incorrect data, e.g. wrong domains Insert SQL Injection Replay Original message replayed later Denial of Service Signal with redundant data flooding

15

16 Attacks Cont.  Blended Attacks attack the RF interface of a retailer

17 Electronic Product Code  EPC The EPC is the fundamental identifier for a physical object. Auto-ID Electronic Product Code Data Specification 1.0 defines the abstract content of the EPC in the form of RFID tags, Internet URLs, and other representations.

18 RFID Middleware Overview

19 DES Encryption Algorithm


Download ppt "Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar."

Similar presentations


Ads by Google