1 RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Overview of new technologies Jørgen Bach Andersen, Aalborg University, Denmark Sven Kuhn, Rasmus Krigslund, Troels B. Sørensen.
Lesson Title: Tag Threats, Risks, and Mitigation Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
University of Kansas | School of Engineering Department of Electrical Engineering and Computer Science Milagros FigueroaApril Access Methods for.
Topic 3: Sensor Networks and RFIDs Part 3 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
1 EPCglobal Training Suite. 2 Introduction Tag Protocol - UHF Class 1 Gen 2 Ultra High Frequency (UHF) Generation 2 (Generation 1 is deprecated) Class.
Lesson Title: Singulation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID Cow Jewelry – or – Revolution Travis Sparks
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
RFID Radio frequency identification,or RFID,is an Auto-ID technology that uses radio waves to identify a physical object. Tags ReaderAntenna.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
IWD2243 Wireless & Mobile Security
Radio Frequency Identification Inventory Tracking and Status Monitoring of Blood Units Team 10 Mark Green Melissa Kronenberger Nadine Tribur Aaron Schlanser.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Radio Frequency Identification (RFID) Technology
Wireless# Guide to Wireless Communications
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
EPCglobal Training Suite
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 RFID Technology and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
EPC Standards EPC System elements : EPC Coding structure The reader/ tag Protocols Savant platform The Object Numbering Service (ONS) PML server.
University of Pennsylvania Electrical and Systems Engineering Department ABSTRACT: The last decade has seen the expansion of computer usage from scientific.
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
RFID (RADIO FREQUENCY IDENTIFICATION)
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
RFID (RADIO FREQUENCY IDENTIFICATION)
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Modulation and Data Transfer February 21, References gy-Article.asp?ArtNum=2
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Types of RFID Tags Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Lesson Title: EPCglobal Gen2 Tag Finite State Machine Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Radio Frequency Identification composition - implementation – vision
3506-D WEST LAKE CENTER DRIVE,
Mobile Computing CSE 40814/60814 Spring 2017.
Radio Frequency Identification (RFID)
RADIO FREQUENCY IDENTIFICATION
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Selective Blocking of RFID Tags for Consumer Privacy
Mobile Computing Lecture Materials By Bintang Eka Putera.
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

1 RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas

2 RFID Tutorial Outline Introduction RFID System Tags Readers Data link layer –Modulation –Encoding –Anti-Collision Protocol –Frequencies Standardization EPCglobal Network EPC vs UPC EPC Tag Classes –Class-0 Tag –Class-1 Gen-1 Tag –Class-1 Gen-2 Tag RFID Threats Categorized with STRIDE

3 What is RFID? Stands for Radio Frequency Identification Uses radio waves for identification New frontier in the field of information technology One form of Automatic Identification Provides unique identification or serial number of an object

4 Applications Mobil Speedpass systems Automobile Immobilizer systems Fast-lane and E-Zpass road toll system Animal Identification Secure Entry cards Humans Supply chain management

5 RFID System Tags consists of antenna and a microchip Readers consists of a transmitter, receiver, and one or more antennas Management system Communication protocol Computer Networks

6 RFID System

7 RFID Tag Tag is a device used to transmit information such as a serial number to the reader in a contact less manner Classified as : –Passive –Active –Semi-passive

8 Classification of Passive and Active tag Characteristics Passive RFID tag Active RFID tag Power SourceProvided by a readerInbuilt Availability of powerWithin the field of readerContinuous Signal Strength (Reader to Tag) HighLow Signal Strength (Tag to Reader) LowHigh Communication range< 3meters>100 meters Tag reads< 20 moving 3mph in few seconds >1000 moving 100mph in 1 sec Memory128 bytes128 Kbytes Applicability in supply chain Applicable where tagged items movement is constrained Applicable where tagged items movement is variable and unconstrained

9 RFID Reader Also known an interrogator Reader powers the tag by sending it RF energy Can be handheld or stationary Consists of: –Transmitter –Receiver –Antenna –Microprocessor –Memory –Controller or Firmware –Communication channels –Power

10 Communication Link Inductive Coupling Backscatter Coupling

11 Modulation Process of changing the characteristics of radio waves to encode data and to transmit it to the other end Techniques used depends on the power consumption, reliability and available bandwidth. –Amplitude Shift Keying (ASK) –Frequency Shift keying (FSK) –Phase Shift Keying (PSK)

12 Encoding

13 Anti-Collision Protocol Tag Anti-Collision protocol – Aloha/Slotted Aloha – Deterministic binary tree walking – Query tree walking Reader Anti-Collision protocol – TDM/FDM

14 RFID Frequency range Frequency BandDescription < 135 KHzLow frequency – MHzHF 7.4 – 8.8 MHzHF – MHzHF – MHzHF 433 MHzUHF 868 – 870 MHzUHF 902 – 928 MHzUHF 2.4 – GHzSHF – GHzSHF

15 Standarization ISO –18000–1: Generic air interfaces for globally accepted frequencies –18000–2: Air interface for 135 KHz –18000–3: Air interface for MHz –18000–4: Air interface for 2.45 GHz –18000–5: Air interface for 5.8 GHz –18000–6: Air interface for 860 MHz to 930 MHz –18000–7: Air interface at MHz EPCglobal –UHF Class-0 –UHF Class-1 Generation-1 (Class-1 Gen-1) –UHF Class-1 Generation-2 (Class-1 Gen-2)

16 Electronic Product Code Global (EPCglobal) Network EPCglobal Network consists of five component –Electronic Product Code (EPC) number –ID system (tags and readers) –EPC middleware –Discovery Service (ONS) –Information service

17 Electronic Product Code (EPC)

18 EPC vs. UPC (Barcodes) Both are forms of Automatic identification technologies Universal Product Code (UPC) require line of sight and manual scanning whereas EPC do not UPC require optical reader to read whereas EPC reader reads via radio waves EPC tags possess a memory and can be written while UPC do not

19 EPC Tag Classes Class 0PassiveRead only Class 1PassiveRead only write once Class 2Passive65 KB read-write Class 3Semi-passive 65 KB read-write with built-in battery Class 4ActiveBuilt-in battery Class 5Active Communicates with other class 5 tags and devices

20 EPCglobal UHF Class-0 Tag Describes physical layer reader-to-tag link, tag-to-reader link and data link anti- collision protocol Reader to tag link use 100% or 20% modulation amplitude modulated (AM) carrier signal Use binary tree anti-collision protocol

21 Class-0 Reader-to-Tag Symbols

22 Binary tree anti-collision protocol for Class-0

23 EPCglobal UHF Class-1 Gen-1 Employs same modulation and encoding techniques as UHF Class-0 Use query tree walking anti-collision protocol –Reader queries by using group of bits, matching tags responds with an 8-bit response during one of eight time slots. Eight time slot for tags response

24 Query Tree Protocol for Class-1 Gen-1 and first step of Gen-2

25 EPCglobal UHF Class-1 Gen-2 Use one of ASK, FSK or PSK modulation with PWM encoding referred as pulse- interval encoding (PIE) format. Reader chooses the encoding format for tag-to-reader link. –FM0 –Miller Use Aloha-based random anti-collision protocol called Q protocol

26 Q Protocol (Anti-Collision Protocol) Select phase –Single out particular tag population with one or more bits like query tree protocol Inventory phase – identify individual tag using Q protocol (slotted-aloha based) –Reader sends Query with parameter Q and Session number (Q=4 is suggested default) –Reader creates slotted time –Tags pick random 16-bit number for handle –Tags in requested session pick a random number in the range [0,2^Q-1] for slot_number –If slot_number = 0, backscatter handle –If slot_number != 0, wait that number of slots to backscatter handle –Reader ACKs individual tag with handle and goes to access phase. All other tags wait. –If more that one tag answers, reader can send same Q again or send modified Q Access phase –Reader interacts with tags requesting EPC number and any other information

27 RFID Threats Categorized with STRIDE Spoofing identity Tampering with data Repudiation Information disclosure Denial of service Elevation of privilege

28 Spoofing Threat A competitor or thief performs an unauthorized inventory of a store by scanning RFID EPC tags with an unauthorized reader to determine the types and quantities of items. An unauthorized reader can query the tag for the EPC number because most tags used in the supply chain respond to any reader. The EPC number is only a number. However, because of the standard way of creating an EPC number, an attacker can determine the manufacturer and possibly the product number. It is likely that the number assigned to all manufacturers will become public knowledge as well as the product number after some short period of time.

29 Tampering with Data Threats An attacker modifies a tag. –An attacker modifies the tag in a passport to contain the serial number associated with a terrorist or criminal. –An attacker modifies a high-priced item’s EPC number to be the EPC number of a lower cost item. –An attacker modifies the EPC number on tags in the supply chain, warehouse, or store disrupting business operations and causing a loss of revenue. An attacker adds a tag to an object. –An attacker adds a tag in a passport that contains the serial number associated with a terrorist or criminal. –An attacker adds additional tags in a shipment that makes the shipment appear to contain more items than it actually does. An attacker deletes data on a tag. –An attacker kills tags in the supply chain, warehouse, or store disrupting business operations and causing a loss of revenue –An attacker erases the tags setting all values including the EPC number to zero in the supply chain, warehouse, or store disrupting business operations and causing a loss of revenue. –An attacker removes or physically destroys tags attached to objects. This is used by an attacker to avoid tracking. A thief destroys the tag to remove merchandise without detection. An attacker reorders data on a tag or reorders tags. –An attacker exchanges a high-priced item’s tag with a lower-priced item’s tag.

30 Repudiation Threats A retailer denies receiving a certain pallet, case, or item. The owner of the EPC number denies having information about the item to which the tag is attached.

31 Information Disclosure Threats A bomb in a restaurant explodes when there are five or more Americans with RFID-enabled passports detected. An attacker blackmails an individual for having certain merchandise in their possession. A fixed reader at any retail counter could identify the tags of a person and show the similar products on the nearby screen to a person to provide individualized marketing. A competitor or thief performs an unauthorized inventory of a store by scanning tags with a reader to determine the types and quantities of items. A thief could create a duplicate tag with the same EPC number and return a forged item for an unauthorized refund.

32 Denial of Service Threats An attacker kills tags in the supply chain, warehouse, or store disrupting business operations and causing a loss of revenue. A shoplifter carries a blocker tag that disrupts reader communication to conceal the stolen item. The blocker tag is used against the Class-0 using the tree walking anti-collision protocols. An attacker can simulate many RFID tags simultaneously causing the anti-collision to perform singulation on a large number of tags making the system unavailable to authorized use.

33 Elevation of Privilege Threats A user logging on to the database to know the product’s information can become an attacker by raising his/her status in the information system from a user to a root server administrator and write or add malicious data into the system.

34 Contact Information NEERAJ CHAUDHRY 705 West Putman Street, Apt # R-2, Fayetteville, AR Phone: (479) Dale R. Thompson, P.E., Ph.D. Department of Computer Science and Computer Engineering University of Arkansas 311 Engineering Hall Fayetteville, Arkansas Phone: +1 (479) FAX: +1 (479) WWW: