rfid2010 presentation final1
DESCRIPTION
Presentation given at International IEEE RFID 2010 conference. For the accepted paper" Blocking Reader: Design and Implementation of a Passive UHF RFID Blocking Reader.TRANSCRIPT
Gaurov Narayanaswamy, Shesh Kumar Jagannatha and Daniel W. Engels
Blocking Reader 15 April 2010Slide 1
Handheld Readers
Alien Readers Alien Readers
Sirit Readers
Tagged Objects
Blocking Envelope
Blocking Reader 15 April 20102
Introduction• Passive UHF RFID.• Readers ,Tags and Back-end Information system• Tags have unique identifier.• Wirelessly communicates identifier• Frequency of operation 860-960 MHz.
Reader
Back-end Information System
Reader Antenna
Tags (Recall Excalibur, UPM, Alien Squiggle)
Blocking Reader 15 April 20103
Threats to Privacy and Security
[1] Ari Juels. Rfid security and privacy: A research survey. IEEE Journal on Selected Areas in Communication,, 24.
• RFID doesn’t require LOS.
• Privately owned Tags can
be read by any Readers.
• Snooping aids thieves and spies.
• RFID Technology advancing too fast.
• Security threat to Industry.
• Security threat when used in military. Picture [1]
Blocking Reader 15 April 20104
Previous Work:
• Blocker Tag [2]
• Killer Tag approach
• Faraday Cage approach
• Active Jamming approach
• Smart RFID Tag approach
- Hash-lock approach (Meta-ID)
- Re-encryption approach ( Bank notes)
- Silent Tree-Walking [3]
[2] Ari Juels , Ronald L. Rivest , Michael Szydlo, The blocker tag: selective blocking of RFID tags for consumer privacy, Proceedings of the 10th ACM conference on Computer and communications security, October 27-30, 2003, Washington D.C., USA[3] S. A. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In First International Conference on Security in Pervasive Computing, 2003.
Blocking Reader 15 April 20105
Motivation
• Personal Privacy can be preserved by a simple device.
• Scope for Low-Cost UHF RFID Reader.
• Implementation of this on a persons body.
• Tag Capture.
• Multiple Tags.
• Communication Interface approach.
• Protocol approach.
Blocking Reader 15 April 20106
ISO 180006-C Gen 2 Protocol.
Figure: Single Tag Reply [3]
Blocking Reader 15 April 20107
Theory of Tag capture:
• Power:
Tags responds to higher
power
• Frequency Hopping:
Tuned Frequency
• Slot Duration:
Time between two slots
Blocking Reader 15 April 20108
Theory of Tag capture for a typical Passive Tag:
• Tags choose higher power
• Filter takes time to switch
to different frequency.
Blocking Reader 15 April 20109
Implementation of Blocking Reader:
Blocking Reader 15 April 201010
Complete circuit diagram
Blocking Reader 15 April 201011
Performance of Blocking Reader:
Sniffer Blocking Reader
Squiggle Tag
Distance D
Height1.4 m
Tag Reply:
• Reply seen for a alien squiggle Tag.• Used NI Sniffer.
Blocking Reader 15 April 201012
Performance of Blocking Reader cont..:
Vapc = 1.6 (Power= 9dBm)
Blocking Reader 15 April 201013
Performance of Blocking Reader cont..:Sirit Reader
Blocking Reader
Squiggle Tag
1.5 mts Distance D
Height1.4 mts
Maximum Blocking distance when an unauthorized Sirit Reader is present
Vapc = 2.6 (Power= 21dBm)Vapc = 1.6 (Power= 9dBm)
Blocking Reader 15 April 201014
Performance of Blocking Reader cont..:Blocking Range results comparing with Friis Power
Blocking Reader 15 April 201015
Performance of Blocking Reader cont..:
Sirit Reader
Blocking Reader
Squiggle Tag
2.1 mts
Distance D
Height1.4 mts
θ
Blocking Envelope: Around the Tag
Blocking Reader 15 April 201016
Blocking Reader application:
Sirit Reader
Squiggle Tag
Height1.4 mts
θHuman Body
Distance D2.7
mts
Blocking Reader
Performance of BR in presence of Human
Blocking Reader 15 April 201017
Conclusions:
Blocking Reader creates blocking envelope around the Tag preserving it from being read from any unauthorized Reader.
Blocking Reader is designed to be FCC compliant.
Blocking Reader also creates an envelope around a person wearing it, preserving privacy of his Tags.
Blocking Reader works by capturing the Tags.
Blocking Reader is a Low-Cost Device.
Any Reader can be used as Blocking Reader.
Maximum Blocking envelope is 1.4 mts
Blocking Reader 15 April 201018
Thank You
Any Questions ??