Download - RFID based tracking System
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
RFID Based Tracking System
Shahrukh Ayaz KhanSeminar Presentation
SSBT’s College of Engineering & Technology,Bambhori, Jalgaon - 425 001, Maharashtra, India
April 10, 2015
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 1/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Presentation Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 2/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 3/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Introduction
In last few years RFID technology has become a majordriver for various business like logistics, supply chainmanagement and acess control
Many of these applications have based on successfulimplementations of RFID tags but on reader’s side weshow how semi-passive tags helps implementing andattacking security enhanced RFID.
It has various security and privacy concerns, which is dueto the inherent vulnerabilities in the architecture of theRFID system..
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 4/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
What is RFID?
Radio Frequency Identification
Uses Radio Frequency waves to transfer data between areader and a tag to identify, categorize, track...
One form of Automatic Identification
RFID is fast reliable and does not require physical sight orcontact between reader/scanner and the tagged item.
Provides unique identification or serial number of anobject (pallets, cases, items, animals, humans
Some of the large companies like Microsoft and Wallmartare mandating their suppliers to use RFIDs to cut theirwarehousing costs and other relating expenses
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 5/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 6/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Why was RFID invented?
Like most technologies used today, RFID got it start fromWWII. The parent technology of RFID is transponder.
Transponders are radio devices that can recieve or sendsignals. They are found virtually on all aircrafts andwatercrafts.
In WWII transponders were used as IFF (identify Friend orFoe) to distinguish Allied Aircraft from enemey ones.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 7/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Key Components of RFID system
A RFID system is made up of two parts: a tag or label anda reader.RFID tags or labels are embedded with a transmitter anda receiver.The RFID component on the tags have two parts: amicrochip that stores and processes information, and anantenna to receive and transmit a signal.RFID Reader is also known an interrogator
Figure: Basic Parts of RFID systemApril 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 8/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
RFID Tag
Figure: RFID TAG
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 9/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Types of tags
Passive: gets energy from reader
Active: battery powered
Semi-passive: battery and energy from reader TheSemi-passive tags are mainly targeted for the security andprivacy attacks
Figure: Use of tags
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 10/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 11/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
How it works?
Figure: Working of RFID
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 12/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
How it Works?
The tag contains the specific serial number for one specificobject.
To read the information encoded on a tag, a two-wayradio transmitter-receiver called an interrogator or readeremits a signal to the tag using an antenna.
The tag responds with the information written in itsmemory bank.
The interrogator will then transmit the read results to anRFID computer program.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 13/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 14/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Security and Privacy challenges
RFID Tag Cloning Attack :cloning is done by forging thedata from an authentic tag generally into a blank tag
Physical Attack: Any kind of tampering to tagarchitecture depending upon intention of attacker
Skimming Attack: Usually done by reading the data of tagwithout authorization of tag holder
Spoofing Attack: Attacker try to act like a reader inorderto interrogate tags
Relay Attack: Attacker acts an Man In Middle betweentag and reader
Denial of Services(DOS) Attack: It involves jamming ofoperating frequency of communication channel
Clandestine Tracking: It exploits the ubiquitous nature ofthe tag, thus making it a very easy attack prone
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 15/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Sucessful Attacks
HID cards (2007)
Britsh e-Passports(2008)
RFID credit cards(2009)
Sacremento Capitol access cards(2010)
Human Implantable ”VERICHIP”(2010)
Dutch e-Passports(2009)
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 16/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 17/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Some of the Applications
People/Animal tracking
Figure: Animal/ Human Tracking
Manufacturing or Supply chain Management
Figure: Supply Chain Mangement
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 18/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Contd..
Government Issued Machine readable travel documents
Figure: e-Passports
Toll collection and contactless payment
Figure: Toll booth
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 19/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Contd..
Library management
Figure: Library Managing
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 20/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Recent Innovation
Small RFID chip, here compared to a grain of rice, isincorporated in consumer products, and implanted in pets,for identification purposes
Figure: Small RFID chip ”Verichip”
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 21/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 22/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Advantages
Inventory efficiencyVulnerability to damage minimizedEasy to useHigh memory capacityCannot be easily replicated and therefore, it increases thesecurity of the product.Simple to install/inject inside the body of animals/humanbeings
Disadvantages
Security concerns like possibility of unauthorized reading ofpassports and credit cardsMore expensive than barcode systemUnread tagsDoesnt work properly on liquids and metal products.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 23/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Outline
1 Introduction
2 The Basics
3 Working of RFID
4 Concerns
5 Applications
6 Pros and Cons
7 Conclusion
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 24/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Conclusion
In this research, we identified the various challenges facingRFID Card, with careful references.
We also highlighted the diverse application areas of theRFID technology
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 25/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
References
1 D. Anthony, T. Henderson, and D. Kotz, Privacy inlocation aware computing environments, IEEE PervasiveComputing,2009.
2 A. Beresford and F. Stajano, Location privacy in pervasivecomputing, IEEE Pervasive Computing, 2011.
3 A. R. Beresford and F. Stajano, Mix zones: User privacy inlocation-aware services, in Pervasive Computing andCommunications Workshops (PERCOMW), 2008.
4 J. I. Hong and J. A. Landay, An architecture for privacysensitive ubiquitous computing, in International conferenceon Mobile systems, applications, and services (MobiSys),2009.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 26/27
RFID
Outline
Introduction
The Basics
Working ofRFID
Concerns
Applications
Pros and Cons
Conclusion
Thank You...ShahrukhA.Khan
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 27/27