radio frequency identification by bhagyesh lodha vinit mahedia vishnu saran mitesh bhawsar

Post on 26-Dec-2015

218 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Radio Frequency Identification

ByBhagyesh LodhaVinit MahediaVishnu SaranMitesh Bhawsar

Introduction Automatic Identification method for storing and

retrieving data remotely Small object which is embedded inside a person,

animal or any product A silicon microchip mainly Integrated Circuit

attached to Antenna for Transmitting and receiving of data.

RFID reader wirelessly communicate with the tag to retrieve information

The Reader and tag communicates with each other through Radio Frequency

Introduction (continue…)

RF Subsystem RFID Tags

- Electronic device Affix inside any object.

- Each Tag has Unique Identifier.

- Has memory, environment sensors and security mechanism.

RFID Readers

- Communicates with RFID Tags RFID Tags and Readers are 2 way communication.

RFID Tag Characteristics Identifier Format

- Uniquely identifies tags

- Data Format used is Electronic Product Code.

- Four data fieldsHeader EPC Manager Id Object Class Serial Number

Specifies EPC type

Uniquely Define the organization responsible

Uniquely identifies class object

Uniquely identifies instants of class object

Power Source1. Passive:- Has no internal power supply- Incoming radio frequency gives enough power to CMOS IC to power up- Antenna is designed to collect power.

RFID Tag Characteristics (Continue)

2. Active- Has own internal power source- Uses for high power source, in water and may have sensors3. Semi Passive- Has battery but only powers the IC and does not help in transmitting any signal- Usually stores energy

RFID Tag Characteristics (continue)

RFID Security Controls RFID Usage Policy

- Authorized and Unauthorized use of RFID Minimizing sensitive Data Stored on Tag HMAC Tag Memory Access Control Encryption of Data

Authentication Assurance of identity of an entity at other end Secret Key or Public key Cryptography is used Public key Cryptography is more preferable since

there is no key exchange and public key is transfer through digital signature

Two methods

- Zero Knowledge Protocol

- Challenge Response Protocol

Challenge Response Protocol Reader sends challenge to the RFID tag The challenge is encrypted public key made from

private key RFID Tag decrypts the response with its on private

key and result is same along with sending a response to the Reader

RFID Tag has EPROM memory to store the private key with microcontroller to process the request.

RFID TAG With Authentication Mechanism

Challenge Response Protocol (continue)

Protocol Implementation

Challenge Response Protocol (continue)

Applications Tracking goods during supply chain and

manufacturing process. Controlled access to building or network Scanning objects Payment systems Airline passenger and baggage tracking made

practical and less intrusive Authentication systems already in use (key-less car

entry)

Types of Attack• Spoofing

Incorrect data , e.g. wrong domains • Insert

SQL Injection• Replay

Original message replayed later • Denial of Service

Signal with redundant data flooding

Attacks Cont. Blended Attacks

attack the RF interface of a retailer

Electronic Product Code EPC

The EPC is the fundamental identifier for a physical object. Auto-ID

Electronic Product Code Data Specification 1.0 defines the abstract content

of the EPC in the form of RFID tags, Internet URLs, and other representations.

RFID Middleware Overview

DES Encryption Algorithm

top related