Sie sind auf Seite 1von 4

International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com


Volume 3, Issue 3, May-June 2014 ISSN 2278-6856

Volume 3, Issue 3 May June 2014 Page 159


Abstract - Intelligent Tags are built with important
information that is generally communicated with remote
HOST. Tags are fragile that they can be tampered through
different types of physical and logical attacks. The TAGS
must be provided with built-in intelligence to sense external
tampering and provide alerting either locally or remotely
through hand held devices so that preventive actions can be
taken and the Tags can be secured. Many types of sensing
mechanisms are to be provided for sensing different types of
tampering, making the Tagging system complicated. This
paper presents a unified mechanism through which any type
of tampering is sensed and the same is communicated to the
neighborhood of the embedded system or to a remote hand
held device.

Key words: Intelligent Tags, Tampering, attacking Tags,
alerting, communicating tags, tamper proofing, sensors,
physical and logical attacks.

1. INTRODUCTION
Tags are being used for many purposes which include location
tracing, object identification alerting the changes taking place in
the neighborhood of the Tags, Power management,
communicating with the HOST, securing the communication
with the HOST, location management etc. As the Tags are made
more intelligent from day to day, they are prone to variety of
attacks making the tags ineffective leading to loss of
information stored in the TAGS.

Tampering the intelligent tags can be undertaken by several
ways which include destroying, twisting, blocking the
communication ports, destroying or altering the data, disturbing
the communication channels, disturbing the functioning of the
Tag by code manipulation which effect the functions like
beeping, power management, efficient communication with the
HOST device, memory management etc. Some of the attacks
such as tag removal, tag destruction, etc., make the tags
permanently disabled. Some other attacks degrade the operation
of the TAG.

Every Tag has many components in it which include the
wireless medium, side channel, reader, transmitter etc. A tag
can be attacked through affecting any of the components
situated on the TAG. Tags can also be attacked through light,
ultraviolet rays, ionizing radiation, probing etc.

The TAGS must be provided with built-in intelligence to sense
external tampering either through physical or logical attacks.
Some more devices should be added to embedded systems like
capacitive sensors (pressure sensors, push to on switches),
tamper proof stickers, tamper proof shields and many more in
order to protect the tag from physical hackers.

The incidences of tampering can be studied through theses
sensing devices and a system of alerting shall help in protecting
the TAGS from external tampering. It is necessary to alert the
LOCAL user and the remote user when attempts to tampering
take place. Communication between the TAGS and the remote
Mobile phone is required for alerting the user of the TAG when
attempts to tamper the TAG take place. It is necessary to
investigate the methods with which tampering could be
recognized and alerting the user could be implemented.

Some considerations in tamper proofing an intelligent tag might
include:
Identify who a potential tamperer might be and what
level of knowledge, materials, tools, etc. might they
have.
Identify all feasible methods of unauthorized access into
a product, package, or system. In addition to the primary
means of entry, also consider secondary or "back door"
methods.
Control or limit access to products or systems of interest.
Improve the tamper resistance by making tampering
more difficult, time-consuming, etc.
Add tamper-evident features to help indicate the
existence of tampering.

Every tag thus, must be protected from tampering. Several
technologies are being used for tamper proofing of the tags and
use of more technologies for protecting the tags from different
types of attacks makes the tagging system more complex. The
tamper proofing system must be simple and unified approach is
required for tamper proofing of the tags from different types of
attacks.

2. RELATED WORK
Tamper proofing through inclusion of capacitive sensors has
been attempted [1]. Capacitive sensors can be constructed for
tamper resistant enclosures to prevent unauthorized intrusions.
A printed circuit provides serpentine geometric patterns of
conductors. Any penetration of this envelope interferes with the
conductive serpentine, producing a detectable warning of
intrusion. Capacitive sensors have been presented as suitable
for implementing in the area of physical security cryptographic
modules. These sensors conform to Levels 3 and 4 of the
Federal Information Processing Standard (FIPS).

Digital watermarking scheme for tamper proofing has also been
attempted [2]. Digital watermarking in multimedia is a method
of putting information on the document, picture or video such
that it can be protected from manipulation and duplication. This
technology is promising for RFID tamper detection. The method
dealing with watermarking is used for tamper detection in RFID
Tags and tamper detection in the RFID data stream. The method
used for tamper detection has some unique features. For
example, the embedded watermark is imperceptible. It also
prevents illegal embedding and verification; so only an
authorized person who has a key can embed, extract and verify
watermarks. Furthermore, it uses blind verification in which the
Tamper Proofing of the Tags through
Pressure Sensing

Dr. JKR Sastry
1
, and Dr. A. Vinya Babu
2

1
Department of Computer Science and Engineering, KL University

2
Department of Computer Science and Engineering, J NTU Hyderabad
International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 3, May-June 2014 ISSN 2278-6856

Volume 3, Issue 3 May June 2014 Page 160


original unmarked data should not be required for watermark
verification. Watermarks can also help in getting information
like the location at which it is altered. It also helps in detecting
the kind of alteration that has been done.

Tamper proofing can also be used through a method around the
standard of logical memory map of ISO/IEC 18000-6 type C[3].
An RFID Tags memory is typically divided into four memory
banks. The idea proposed in this method is based on a scheme
called the bank level locking scheme. In this scheme, one of the
sections in the memory bank is locked. An idea has been
proposed for recording into a specially designed area of the
memory where only the TAG itself can write. Readers can only
read that area but cannot write. Whenever there is any write
operation on the TAG, it writes it into the Tags write only area.
This allows tracking of tampering. If a malicious user tries to
tamper with the data then it will be written into the TAG write
only part and upon reading by a genuine reader it will be
retrieved. Middleware will read the write and detect any
tampering if done.

TAG authentication scheme [4] called TAG-AUTH is used to
prevent TAG cloning. This authentication mechanism relies on
the high security and computation at the back-end side and
allows for less computation in the TAG itself. It uses TAG ID, a
secret key stored in TAG and a virtual ID. This virtual TAG ID
is only communicated to the reader. The back-end server
decrypts the virtual TAG to get the valid TAG ID.

An anomaly-based system to detect TAG cloning for tamper
proofing has been attempted [5]. The idea is to monitor users
behavior on a daily basis and compare it with current activity in
real time. Since each individuals behavior is different and
almost unique we can build a different profile for each user.
The RFID Tags audit record is used to build a profile for
normal behavior, which can be used to determine when there is
a significant change or deviation in normal behavior. When an
anomalous behavior is detected, it triggers an alarm and flags a
security breach.

Physical layer fingerprints of RFID transponders for cloning
detection [6] are also used for tamper proofing. The method
proposed by them is based on spectral features of response
signal and modulation shape generated by transponders for in
and out reader signals. The authors have tested it on fifty RFID
smart cards and found uniqueness of patterns in the physical
layer fingerprints.

The recent Surveys [7] show that there is no silver bullet
solution that can be applied to every application. It has
compared many approaches but at the end it indicates that
authentication needs to be specific to the application area. Also,
it indicates that further research is needed in the area of offline
authentication and network issues.

Encryption technique against tracking and cloning is one of the
method used for tamper proofing [8]. The TAG rotates
pseudonyms from time to time in order to respond to a query.
An authentic reader would share the pseudonyms in advance
such that it would be the only reader to track it consistently. If
an attacker reader is querying constantly then reader would
either slow down the response or it will go to sleep. However,
these techniques would require lot of calculation for an RFID
chip.

A tamper proofing method that combines a set of methods has
been proposed [9] that have been used previously individually
for tamper proofing of a TAG as all the methods together forms
a full proof system. The method proposed by them considers
the conversion of any type of tampering into pressure
equivalence and based on the amount of pressure exerted
appropriate alerting has been initiated through an alerting
system.

Software architecture for implementing an efficient tamper
proofing method for alerting the local and remote user about the
tampering taking place in and around the TAG has been
presented [10]. The architecture is efficient that any of the
embedded systems can implement the same.

3. HARDWARE ASSEMBLY
The Hardware architecture that is used for assembling the
embedded hardware is shown in the Figure I. The embedded
board which is designed around ARM7 technology is shown in
the Figure II. The interconnection between hardware devices
forms the hardware design related to intelligent tag Tamper
sensing system. ARM 7 acts as main controller to which most of
the devices are interfaced directly through various busses. To
the main bus which is AHP Bus, VLSI Peripheral bus and Local
bus are connected. To the VLSI bus GPIO bus and I
2
C bus are
connected. The devices are connected to the busses.
External memory which is EEPROM is connected via I
2
C Bus.
Three devices are used for establishing communication in
different communication modes. While Bluetooth module is
connected through USB (Universal serial bus) to the
microcontroller through VLSI bus. Similarly the Wi-Fi is
connected to the microcontroller through UART01 and VLSI
bus. GPS is connected to microcontroller UART02 and VLSI
bus. LCD, LEDs, Keypad, Buzzer, Beeper, reset gate are
connected to the Micro controller through GPIO and VLSI Bus.
LCD, and LEDs are used to alert local operator about the kind
of tampering that has taken place. The microcontroller is loaded
with ES application which provides a tamper proofing system.
The ES application keep sensing the presser exerted through I
2
C
communication method and translates the pressure to the kind
of tampering that has taken place on the Intelligent Tag. The
sensor is pressurized every time any kind of pressure is exerted
on the ES board. The tampering that has been decoded from the
Pressure which is read through A/D converter to which the
pressure sensor is connected is displayed on the LCD as text or
by buzzing a buzzer, or through beeping a beeper and by
sending an SMS message to the HOST through Bluetooth
device or through WiFi device.

4. SOFTWARE ASSEMBLY
The embedded software assembly undertaken using of C++
language is shown in the Figure III. A separate class has been
used to model every device that is connected to the micro
controller, all the functions required to drive the devices are
contained in the classes related to the respective devices.

The Tamper proof control class has functions to read the input
provided by either pressure sensor or Push to ON/OFF switches.
The Tamper proof class translates the pressure into the kind of
tampering and the device on which the tampering has been
effected. The tamper proof class also determines the kind of
alerting that must be made based on the device on which the
tampering has been initiated. The output on to LCD or Buzzer
or beeper is affected by initiating functions of the classes that
are related to those devices. The communication control class is
International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 3, May-June 2014 ISSN 2278-6856

Volume 3, Issue 3 May June 2014 Page 161


used to send the SMS to a remote hand held device either
through Bluetooth or Wi-Fi device based on the arbitration that
undertakes with the remote host for transmitting message.


Figure I: Hardware assembly of Tamper sensing system


Figure II: the Embedded Board related to tamper sensing
system
5. EXPERIMENTATION
Experiments are conducted by writing a small software
class resident in each of the module. Within the tamper
proofing system the data transmitted by pressure sensor
and the push-to-on sensor is processed by the Main
control of temper proofing system. The alerts that are to
be communicated as a consequence of tampering are
transmitted to the alerting system. The alerting system
either alerts the local neighborhood through LCD, LED
or beeper or the remote mobile devices through either
Bluetooth or Wi-Fi Communication. Various types of
Tampering on the ES board have been tried that include
application of physical pressure on the board, attacking
through side channels by creation of magnetic field of
certain strength, creation of a thirstier, short circuiting
the input supply, inducing additional current into input
supply etc. of known strengths in Pascals and watching
and recording the outputs through data written on LCD,
Buzzing pattern, beeping sequence and the type of
message transmitted through either Wi-Fi or Bluetooth
interface.
The experimental results noticed are shown in Table I. It
can be seen from the table specific pressure is exerted
when a specific type of tampering is initiated. The
alerting of the occurrence of the pressure has been
implemented either through SIMS message, or triggering
a buzzer or causing a beeping pattern. The alerting of
occurrence of tampering is displayed on the LCD as
shown in the Figure IV.


Figure IV: Mobile side output
Alert can be sent to HOST and the alert message can be
displayed on the smart screen as shown in figure V.


Figure V: Mobile side output
6. CONCLUSIONS
Protecting the intelligent TAGS is absolutely necessary
for different types of attacks to preserve the safety of the
same. The TAGS must be intelligent that it can sense that
some kind of tampering is being attempted and the
attempting to tamper must be broadcasted to the Local
environment and to a remote location where the master of
the TAG is resident.
TAGS can be tampered in many ways. Building several
mechanisms for sensing and monitoring each type of
tamper is complex and the solutions even if provided
would be cumbersome. A unified solution is necessary
considering any type of Tampering on the TAG.
International Journal of EmergingTrends & Technology in Computer Science(IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com
Volume 3, Issue 3, May-June 2014 ISSN 2278-6856

Volume 3, Issue 3 May June 2014 Page 162


Any type of tampering can be represented in terms of
pressure and the amount of pressure exerted can be used
to indicate the kind of tampering that has taken place so
that alerting of the same can be made to broadcast locally
and to a remotely situated handheld device.
The tamper proofing system has been integrated with an
alerting system. The method is capable of locating, the
type of tampering of the tag and the device on which
tampering is attempted.
Testing of the system has been carried and the test results
justify the concept of unified tamper detection system.
Thus sensing any type of tampering through the exertion
of the presser on the pressure senor is excellent method as
any type of tampering can be represented in terms of
pressuer.

REFERENCES
[1] Eren H, Bentely WA, Sandoor LD, 2005, "Fringe-
Effects Capacitive Proximity sensors for Tamper
proff enclosures", International conference on sensors
for Industry,
[2] Han S, Chao-Hsien Ch, Zongwei Luo, 2011,
"Tamper detection using EPC network uing
watermarking", IEEE security and privacy, Vol. 9,
Iss. 5, Pg. 62-69
[3] Yamamoto A, Suzuki S, Hada H, Mitsigi J, 2008, "A
Tamper detection method for RFID Tag Data",
"IEEE International conference on RFID", Pg. 89-
93
[4] Jamal Abawajy, 2009, "Enhancing RFID Tag
resistance against cloning attack - An approach for
removing redundant data from RFID", 3rd
International conference on network and system
security, Pg. 18-23
[5] Luke Mirowski and Jacky Hartnett, 2007, "A System
to Detect Change of RFID Tag Ownership", IJCSNS
International Journal of Computer Science and
Network Security, Vol. 7, Iss. 7, Pg. 20-27
[6] B. Danev, S. Heydt-benjamin and s. Capkun, 2011,
"Physical-layer identification of RFID devices"
System Security Group at ETH Zurich,
[7] Mikko Lehtonen, Thorsten Staake, Florian
Michahelles,Elgar Fleisch, 2012, "From
Identification to Authentication A Review of RFID
Product Authentication Techniques"
www.im.ethz.ch
[8] Mala Mitra, 2008, "Privacy for RFID Systems to
Prevent Tracking and cloning Mala Mitra, Privacy
for RFID Systems to Prevent Tracking and cloning"
IJCSNS International Journal of Computer Science
and Network Security, Vol. 8, Iss. 1, Pg. 23-31
[9] JKR Sastry, N Venkataram, T Srilakshmi, K
Srinivasa Ravi, 2012-5, "Software Architecture for
Implementing Efficient Alerting System within an
Intelligent TAG", International Journal of Computer
Information Systems, Vol. 4, Iss. 5, Pg. 30,37
[10] JKR Sastry, N Venkataram, T Srilakshmi, K
Srinivasa Ravi, 2012-6, "An Efficient Design
Framework for Building Alerting Systems to Make
Regular tags Intelligent", International Journal of
Advanced Research in Computer Science, Vol. 3, Iss.
3, Pg. 345-348


Figure III: ES software Class diagram

Table I: Tampering related experimental results

Das könnte Ihnen auch gefallen