Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas

Slides:



Advertisements
Similar presentations
Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Advertisements

NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: Tag Threats, Risks, and Mitigation Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
ITEC 810 Overview of Micropayment Technology
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Security in RFID Presented By… NetSecurity-Spring07
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Risk of Using RFID chips in Passports Oscar Mendez.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
RFID Security CMPE 296T -Sankate Sharma -Sangbeom Ryu.
Lesson Title: Electromagnetics and Antenna Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Singulation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Zac Chupka Jeff Signore.
IWD2243 Wireless & Mobile Security
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Cyber Crimes.
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: Fast Fourier Transform Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Ch. 17: Security of RFID slide 1. 2 Roles of RFID applications slide 2 TagsReaderServer(Database) Secure channel Slides modified from presentation by.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 RFID Technology and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: RFID Stakeholders Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
Lesson Title: Types of RFID Tags Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Cut Saturation for p-cycle Design Khalid Al-Snaie Electronics Dept., College of Technology Riyadh, Saudi Arabia Dale R. Thompson* Department of Computer.
Lesson Title: Guidelines for Securing RFID Systems Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Lesson Title: EPCglobal Gen2 Tag Finite State Machine Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions Advanced Information Systems Engineering Lab Saitama University,
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Lesson Title: FCC Rules for ISM Band Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 RFID Security Nicholas Alteen Computer Science Program Florida Gulf.
Lesson Title: ThingNet Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Animal Identification Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Lesson Title: RFID Nominal Read Range in Far Field Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Training Arkansas Computing Teachers (TACT)
Discussion and Conclusion
Lesson Title: Reader Architecture and Antenna Configurations
Title of Poster Site Visit 2017 Introduction Results
Title of session For Event Plus Presenters 12/5/2018.
Copyright © 2008 by Dale R. Thompson Dale R. Thompson
Title of Poster Site Visit 2018 Introduction Results
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Lesson Title: Regulations Affecting RFID
Presentation transcript:

Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material is based upon work supported by the National Science Foundation under Grant No. DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). Copyright © 2008, 2009 by Dale R. Thompson

Tag cloning Tag cloning – Duplicating tag data to another equivalent tag. 2

Reader cloning Reader cloning – Duplicating an authorized reader. 3

Replay attack Replay attack – Recording signals and replaying them later to attack the system. 4

Tag spoofing Duplicating tag signals with unauthorized tag or system made to look like one or more tags and transmitting them to a reader and/or back-end system to mimic an authorized tag. A spoofed tag could act like thousands of tags performing a denial of service attack. 5

Reader spoofing Duplicating reader signals with unauthorized reader or system made to look like a reader and transmitting them to a tag and/or back- end system to mimic an authorized reader. 6

Modifying tag data Modifying tag data – Modifying, adding, or reordering data on tags. 7

Deleting tag data Deleting tag data – Erasing data or locking memory to render the tag useless. 8

Skimming Skimming (also called scanning) – Unauthorized primary access or reading of tag data using an interrogator. Signal which addresses the tag to get information from the tags. 9 Read credit card Number and expiration date

Eavesdropping Eavesdropping (passive) – Unauthorized listening / intercepting through the use of radio receiving equipment. 10

Relay attack or Man-in-the-middle attack Relay attack or Man-in-the-middle attack (Parasitic Eavesdropping) (active) – Unauthorized listening through the use of a separate reader system at distance, while tag is powered by a nearby reader. 11

Jamming Jamming – Using of an electronic device to disrupt all tag/reader communication within its range. 12

Shielding Shielding – Placing an object between the reader and tag to prevent reading of a tag. The object could absorb the signal like water or reflect the signal like a Faraday cage made of aluminum foil. 13

Coupling Coupling – Placing an object near the tag or reader that detunes the circuit enough to disrupt communication. Ferrous material can be placed near a tag such that the frequency of the circuit changes. 14

Blocker tag Blocker tag – Carrying a blocker tag that disrupts reader communication. The blocker tag is used against the anti-collision protocols. An attacker can simulate many RFID tags simultaneously causing the anti-collision to perform singulation on a large number of tags making the system unavailable to authorized use. 15

Privacy Threats by RFID Tracking – Determine where individuals are located Tracing – Determine where individuals have been Hotlisting – Single out certain individuals because of the items they possess Profiling – Identifying the items an individual has in their possession Identification by constellations – Identifying an individual by the group of tag identifiers that they carry. This threat requires profiling the individual first.

Contact Information Dale R. Thompson, Ph.D., P.E. Associate Professor Computer Science and Computer Engineering Dept. JBHT – CSCE University of Arkansas Fayetteville, Arkansas Phone: +1 (479) FAX: +1 (479) WWW:

Copyright Notice, Acknowledgment, and Liability Release Copyright Notice – This material is Copyright © 2008, 2009 by Dale R. Thompson. It may be freely redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder. Acknowledgment – These materials were developed through a grant from the National Science Foundation at the University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas. Liability Release – The curriculum activities and lessons have been designed to be safe and engaging learning experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices. 18