RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.

Slides:



Advertisements
Similar presentations
SMUCSE 7349 RFID Security. SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War.
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
ITEC 810 Overview of Micropayment Technology
RFIDs and the Future Logistic System Dr. Hayden So Department of Electrical and Electronic Engineering 17 Sep, 2008.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
RFID By Jake Schmitt, Neil McLain, Steve Staten. Overview RFID Defined Defined History History Current Applications Controversy Controversy Testing and.
Beyond the Barcode RFIDs Radio Frequency Identification.
J.J. Faxon Andy Vu Dustin Beck Jessica Bentz Mandi Ellis
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
RFID Technology RFID stands for radio frequency identification. This technology allows transmission of data between a transponder and a reader on a contactless.
Contactless RF Payments Delivering Merchant and Consumer Benefits Trevor Pavey Texas Instruments.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID (Radio Frequency IDentification) Sheetal Jain IS-553 Term Paper.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Lecture Notes #7 Radio Frequency Identification (RFID)
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
General Overview Application Uses –Real-Time Location Systems –Inventory Management –Pharmaceutical Tracking –Document Management.
RFID (Radio Frequency ID). RFID system In a typical RFID system, individual objects are equipped with a small, inexpensive tag. The tag contains a transponder.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
IWD2243 Wireless & Mobile Security
RFID – An Introduction Murari Raghavan UNC-Charlotte.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
RFID and Wine Alfio Grasso Deputy Director Auto-ID Lab, ADELAIDE.
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Radio Frequency Identification (RFID) Presenter: Victoria Raskovich.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
Radio Frequency IDentification RFID Technology Presented by Elaine Contant University of Arkansas Libraries – Fayetteville December, 2008.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
EPCglobal Training Suite
RFID Payment Terminal Presented by: Rohit Kale. Introduction RFID: an automatic identification method, relying on storing and remotely retrieving data.
Interrelativity.com The Practicalities, Perils and Promise of RFID Joe McCarthy Connector in Chief Interrelativity, Inc 26 April 2005.
Smart Card Technology & Features
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Near Field Communication Telecommunication Kacie Johnson Summer Bird Washington Farver Jonathan Wright Mike Muchane.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Applications of Rfid (radio frequency identification) © 2015 albert-learning.com APPLICATIONS OF RFID (RADIO FREQUENCY IDENTIFICATION)
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Radio Frequency Identification
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
Describe direct data entry and associated devices, e. g
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Created by: Samantha Conrad.  What is an RFID?  Where did they come from?  Active tags vs. Passive tags  RFID Systems  Who uses these?  What’s in.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
1. 2 Technology The Evolution Of 3 What is RFID Technology? Radio Frequency Identification - A technology that uses electronic tags placed on objects,
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Radio Frequency Identification (RFID)
Team 7 Technical Presentation
Radio Frequency Identification
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007

Introduction Technology Uses of RFID in Mobile Commerce Security & Privacy Concerns Agenda

Introduction Radio Frequency Identification (RFID) is also known as Dedicated Short- Range Communication RFID is an automatic identification method, relying on remotely storing and/or retrieving data from small objects, called RFID tags. These tags contain antennae to receive and respond to queries from an RFID reader. A typical RFID system consists of two main components, tags and readers. RFID devices are similar to barcodes Bar Codes are read or scanned using light – infrared, laser, or optical scanning. RFID tags are read using RF energy – radio waves.  Does not require physical contact or line of sight  Used in various environmental conditions  More beneficial than Bar Codes

Introduction Radio Frequency Identification (RFID) has existed for over 50 yrs  Used in World War II on Allied aircraft to identify “friendly” planes  Used in the 1960’s and 70’s to tag nuclear equipment  Civilian uses began around 1970’s animal ID and temp tracking Railroad inventory tracking  In the 1980’s, became more prevalent worldwide  Electronic toll collection began in 1990’s  Present uses expanding

Introduction Technology Uses of RFID in Mobile Commerce Security & Privacy Concerns Agenda

Technology Basic RFID System Com puter or Data base Rea der Ante nna Tag Antenna w/ integrated circuit chip

Technology 3 types of RFID tag technologies:  Active Have an internal power source Longer range, larger memory Stores the most information Read distance = several 10’s of meters  Semi-passive Similar to passive, except with small battery  Passive Have no internal power supply Powered by radio frequency signal Read distance = 10 mm to 1 meter

Technology 4 different types of tags in use (by radio frequency)  Low frequency tags (125 or kHz)  High frequency tags (13.56 MHz)  UHF tags (868 to 956 MHz)  Microwave tags (2.45 GHz)

Introduction Technology Uses of RFID in Mobile Commerce Security & Privacy Concerns Agenda

Uses of RFID Contactless Payment Systems Exxon Mobile - “ Speed Pass ” American Express -“ ExpressPay ” MasterCard - “ Pay Pass ” Hong Kong - “ Octopus Card ” MARTA - “ Breeze Card ”

Uses of RFID Electronic toll control  Georgia’s Cruise Card  California’s Fas Trak  Illinois’ I-Pass Food Services  Freedom Pay Concert Entry  Tickets embedded with tags  Hitachi’s RFID “mu-chip”

Uses of RFID RFID-enabled mobile phones  Japan Airlines’ cell phone check-in  Can be used as a payment system (still in beginning stages) Restaurants Gas stations Convenience stores  The way it works: “Patrons hold their phones up to terminals, causing the amount due to appear on the phone's screen. The customer will enter a secret code into the phone's keypad, authorizing the payment before holding the phone up to the reader a second time to confirm it.”

Introduction Technology Uses of RFID in Mobile Commerce Security & Privacy Concerns Agenda

Security Concerns Generation 1 RFID was not initially designed for security Some RFID tags are vulnerable to alteration, corruption and deletion of the data Wireless protocols can be jammed, creating a denial of service attack RFID data can be copied  On Jan 29th 2005, RSA Security and a group of students from Johns Hopkins University broke the proprietary encryption algorithm used by Exxon Mobile’s Speedpass. They were able to successfully copy a Speedpass and use the copied RFID tag to purchase gas. Companies are addressing security issues

Privacy risks Profiling Tracking Notification Tag “sniffing”

Solutions Lengthen passwords to 32 bits Make tag ID non-broadcasting 16-bit randomly generated keys - used to encrypt read, write and erase commands. Authenticated RFID, 2-factor Authentication Monitoring systems Education  Some vendor systems are more secure than others  Ensure that tag selection is in alignment of company’s security policy  Be informed, understand risks

This concludes my presentation.