Presentation is loading. Please wait.

Presentation is loading. Please wait.

Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.

Similar presentations


Presentation on theme: "Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security."— Presentation transcript:

1 Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security Issues in Military Supply Chains

2 Outline Introduction RFID System System components Tag categories Attacks and Countermeasures Conclusion 2

3 Introduction Radio frequency identification. The difference of civilian supply chain and military supply chain. Reveal possible attacks to RFID systems. 3

4 RFID System - System components 4

5 RFID System - Tag categories Passive, semi-passive and active. PassiveActive Power source electromagnetic induction Or microwave Battery Read rangeBelow 3 meters5~100 meters VolumeSmallBig Use length10 years2~7 years PriceCheapExpansive 5

6 Attacks and Countermeasures – Eavesdropping Simple but efficient means. Countermeasures: Establishing a secure channel. Encrypting the communication between the tag and reader. Write the tag with sufficient information to identify the shipment to another automated database. 6

7 Attacks and Countermeasures – Man-in-the-middle (MIM) attack Change the information en route. Countermeasures: Encrypt the communication. Send the information through a secure channel. Provide an authentication protocol. 7

8 Attacks and Countermeasures – Denial of service (DoS) The purpose is disable the RFID system cannot be used. Physical layer attacks, such as jamming and interference. Attacker cannot get very close to the target or use an extremely strong transmitter within an effective distance. 8

9 Attacks and Countermeasures – Spoofing Tag cloning. Countermeasures: Authentication protocol and data encryption. Increase the cost and technology complexity. 9

10 Attacks and Countermeasures – Replay Intercepts communication between a reader and a tag to capture a valid RFID signal. The recorded signal will re-entered into the system when the attacker receives a query from the reader. Since the data appears valid, it will be accepted by the system. Countermeasures: Use a challenge and response mechanism. Time-based or counter-based scheme. 10

11 Attacks and Countermeasures – Virus Tags could be used as a medium to transmit a computer virus. Particular RFID virus could use SQL injection to attack the backend servers and eventually bring an entire RFID system down. Countermeasures: Well-developed middleware. 11

12 Attacks and Countermeasures – Power analysis Side-channel attack. The power consumption patterns are different when the tag received correct and incorrect password bits. Countermeasures: Either masking the spikes in power consumption or improving the hash algorithm will protect the tags being attacked by power analysis. 12

13 Attacks and Countermeasures – Tracking Different from any of the previously discussed RFID attacks, tracking is a threat directed to an individual. Manufacturers may put item-level RFID tags into many household products. RFID systems will be used to track people’s movements and even create a precise profile of their purchases. 13

14 Conclusion Although most of the attacking methods discussed in this paper have existed for several years, there is a chance that they are being applied to attacking RFID technology with the increasing use of RFID. Conduct of risk assessments, definition of security policy and development of more sophisticated approaches to defeat the attacks. 14


Download ppt "Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security."

Similar presentations


Ads by Google