Beruflich Dokumente
Kultur Dokumente
Radio Frequency Identification (RFID) is a technology which enables multiple scanning readers can
scan an entire truckload or shopping basket at once, which allows for further automation in many
industry processes. Also, bar codes replicate only an ID number, while RFID tags can contain other
information, such as product details. When combined with sensors, RFID tags can store the history of
storing conditions, mechanical shocks, and so on. The vulnerability of RFID and the objection of
consumers to buy products that include non-protected RFID are holding organizations back from
investing in this promising technology. Information security and privacy are important research areas.
RFID use radio frequencies to exchange the information between tag and reader, this wireless
communication and less computational power if RFID tag make it particularly vulnerable among
information systems. This report presents the RFID Threat Countermeasure Framework to better
understand the wide range of RFID threats and their corresponding protection countermeasures. We
conclude that RFID security and privacy developments are very promising but do require more
development to become practically useful for organizations.
1
1. AN INTRODUCTION TO RFID SYSTEM
RFID stand for radio frequency identification. This technology was invented by Charles Walton and
first used in world war II to identify and authenticate aircraft in flight (IFF: Identify Friendly Foe). It
is done to allow the identification of allied planes. Now, Radio Frequency Identification Technology
(RFID) has moved from obscurity into main stream applications that help speed the handling of
manufactured goods and materials. These systems are one of the most affordable computing
technologies with technical potential and profitable opportunities in a diverse area of applications.
Radio-Frequency identification (RFID) is aimed to use radio waves to read and capture information
stored on a tag attached to an object [2]. The RFID technology is a means of gathering data about a
certain item without the need of touching or seeing the data carrier, through the use of inductive
coupling or electromagnetic waves RFID systems generally consist of tags, readers and back-end
database form. The tag generally consists of RF analog front end, baseband processor and
nonvolatile memory, and several other modules, some of which tag also has encryption features. We
will discuss the whole working of RFID in detail afterward.
2.1 Active RFID System - Active RFID systems use battery-powered RFID tags (also called
active tags) that continuously broadcast their own signal. In the latter case, a tag‘s lifetime is
limited by the stored energy. Active RFID tags are commonly used as ―beacons‖ to accurately
track the real-time location of assets or in high-speed environments such as tolling. Active
tags provide a much longer read range than passive tags, but they are also much more
expensive. Active tag system mainly operates on 433 MHz and 915 MHz based on the
application [3].
An Active RFID systems have three essential parts – a reader or interrogator, antenna,
and a tag. Active RFID tags possess their own power source – an internal battery that
enables them to have extremely long read ranges as well as large memory banks.
Essentially, two different types of active RFID tags are available – transponders and
beacons.
2
2.1.1 Transponders – In a system that uses an active transponder tag, the reader will
send a signal first, and then the active transponder will send a signal back with the relevant
information. Transponder tags are very efficient because they conserve battery life when the
tag is out of range of the reader. Active RFID transponders are commonly used in secure
access control and in toll booth payment systems [2].
2.1.2 Beacons – In a system that uses an active beacon tag, the tag will not wait to hear
the reader‘s signal. Instead, true to its name, the tag will ‗beacon‘, or send out its specific
information every 3 – 5 seconds. Beacon tags are very common in the oil and gas industry,
as well as mining and cargo tracking applications. Active tag‘s beacons can be read
hundreds of meters away, but in order to conserve battery life, they may be set to a lower
transmit power in order to reach around 100 meters read range [2].
2.2 Passive RFID System- Passive RFID systems use tags with no internal power source and
instead are powered by the electromagnetic energy transmitted from an RFID reader. Passive
RFID tags are used for applications such as access control, file tracking, race timing, supply
chain management, smart tags, and more. The tags also have an indefinite operational life.
The lower price point per tag and less maintenance cost makes employing passive RFID
systems economical for many industries.
Generally speaking, three main parts make up in a passive RFID system – RFID tags,
readers and back-end database. Passive RFID tags only have two main components – the
tag‘s antenna and the microchip or integrated circuit (IC).
Passive RFID tags do not all operate at the same frequency. There are three main
frequencies within which passive RFID tags operate. The frequency range, along with other
factors, strongly determines the read range, attachment materials, and application options.
2.2.1 125 – 134 KHz – Low Frequency (LF) – An extremely long wavelength with usually a
short-read range of about 1 – 10 centimeters. This frequency is typically used with animal
tracking because it is not affected much by water or metal.
2.2.2 13.56 MHz – High Frequency (HF) & Near-Field Communication (NFC) – A medium
wavelength with a typical read range of about 1 centimeter up to 1 meter. This frequency
is used with data transmissions, access control applications, DVD kiosks, and passport
security – applications that do not require a long-read range.
3
2.2.3 865 – 960 MHz – Ultra High Frequency (UHF) – A short, high-energy wavelength of
about a one meter which translates to long read range. Passive UHF tags can be read from
an average distance of about 5 – 6 meters, but larger UHF tags can achieve up to 30+
meters of read range in ideal conditions.
Note- In this report, we will mainly focus on passive RFID and all the discussions held from
now onwards will be about passive RFID System.
4
passed to the back-end data processing systems for management control [2].
As the reader and the wireless power of tags vary widely, and often the channel from the
reader to tag channel is called the "forward channel", and that from the tag to the reader is referred
to as "reverse channel".
4. APPLICATIONS OF RFID
RFID applications are very broad and open in nature. Some of them are listed below. Here we
categorized these applications into the field it belongs to –
4.1 Manufacturing- The reason for this growth is the significant benefits of RFID technology. For
example, RFID technology can increase a company's productivity and reliability. By generating real-
time data, RFID systems help prevent product and equipment shortages; bring customers reliable, on-
time delivery or service; track parts inventory; and provide maintenance history in the field
4.2 Retail - It can be used to prevent theft and track assets that are frequently moved and often
misplaced. It improves product visibility, helps in stock management, cashless payment and automated
checkout.
4.3 Logistic- mainly used for tracking, placing product on right shelves, help in fast delivery etc.
4.4 Transportation- RFID used for battery and fluid monitoring, status and location monitoring, access
control, toll collection, safety and security audits etc.
4.5 Medical- RFID generally used to verify patient information, reduce wait times and bottlenecks,
to locate patients.it is also use for stock management and expiry date monitoring.
4.6 Security- used to grant entry to secure areas, tracks time and movement of people, provide
automated entry, key less entry in car, identification od people (E-Passport), access control etc.
5
5.2 Authenticity- the quality of being real. Tags and readers should conduct two-way authentication,
which is that the only legitimate reader and tag can obtain or update the status of each other.
5.3 Tag anonymity- Tag user's true identity, current location and other sensitive information,
communication should be guaranteed confidentiality. To achieve this, in the transmission between the
reader and tag, the confidential information should be encrypted.
5.4 Integrity- In the communication process, the need to ensure that the recipient received the
information during transmission has not been tampered with or replaced the attacker.
5.5 Data privacy- it is the relationship between the collection and dissemination of data, technology, the
public expectation of privacy, legal and political issues surrounding them. It is also known as
information privacy.
5.6 Backward security- Even if an attacker compromised a tag to obtain the status of its current time t1,
at time tl, secret information can‘t be used to identify the tag at time t2 (t2> t1). This is called Backward
security.
6
Over the years researchers have identified many different types of threats that could affect RFID
implementations. In this report we have selected few of the most common and famous attacks and
we will also discuss about its counter measure [6].
7.1 Eavesdropping: In English language, Eavesdropping is the act of secretly or stealthily listening to
the private conversation or communications of others without their consent. Similarly, in case of RFID,
hackers secretly monitor information sent from an RFID tag to a reader, or vice versa, via the air
interface (the communication channel between the reader and tag). Because eavesdropping is
passive—that is, the attacker doesn’t emit any signal—it’s highly difficult to detect.
The most common countermeasures are to encrypt the data (so eavesdropping hackers
can‘t understand the signal) and to use a metal screen to shield the tag and reader during
information exchange (such as at border checkpoints). It‘s also important to limit the distance
between the tag and reader by using the standard with the smallest communication range
sufficient for a given application. However, developers must also bear in mind that, using a
nonstandard reader, hackers can extend a standard communication range several times.
7.2 Spoofing Attack: Attackers get some information of identity by detecting communications
between readers and legitimate tags i.e. eavesdropping. Then network will be accessed by using
this information of identity to impersonate the legitimate tags or readers, which is called the
counterfeiting or spoofing attack. An attacker can fake tags, as well as fake readers.
7
The effective means to prevent counterfeiting and spoofing attacks is to use efficient two-
way authentication protocol actualizing mutual authentication between tags and readers.
7.3 Relay attack: in a relay attack, attackers create a connection between a legitimate reader and a
victim‘s legitimate tag. From the RFID system‘s viewpoint, the communication looks as if the
legitimate tag and the reader are close to
each other, when in fact they‘re
communicating through the (usually
wireless) communication channel that the
attackers have established. Attackers can
thereby authenticate themselves in
access-control or payment systems. In
8
challenge the reader sends, the use of stamp program, a one-time password and using the random
number in authentication protocol, or updating ID information dynamically. In a well-designed
protocol, attackers can‘t deduce the key required to calculate a response from information
exchanged through the air interface.
7.5 Tag Cloning: Cloning is a threat frequently categorized together with spoofing. However,
spoofing and cloning are not the same. Although both threats copy data from a legitimate tag,
spoofing emulates the transmission of tag data while cloning means that the copied data is
transferred onto a new tag owned by the attacker. Just as spoofing, the communication between
legit RFID tags and readers will have to be read and stored, but a tag could also be stolen and then
physically read. The data for the cloned tags are then altered to suit to the needs of the desired
attack and copied onto an empty tag.
In tag cloning, attackers make a duplicate RFID tag, which might either be quite similar in
size or much larger than the original but have the same functionality. Attackers can use duplicates
to access a restricted area, abuse private data, or make an electronic transaction on the victim‘s
behalf. Tag authentication prevents cloning; if developers use a challenge-response protocol, the
information that attackers can obtain through the air interface (such as by eavesdropping) is
insufficient to duplicate the tag. Also, developers can apply appropriate measures at the circuit
manufacturing stage to protect tags from duplication by reverse engineering.
7.6 People Tracking: In people tracking, attackers follow tag carriers‘ movements using various
techniques, including placing fake readers in doors or deploying eavesdropping devices near
legitimate readers. Several countermeasures that I‘ve already discussed also work with tracking,
including using low-range tags or shielding tags, authenticating readers, and disabling tags when
they‘re not in use we must ensure that the information sent by the tag each time is dynamic, and
require tag has a good forward security. Generally, use two mechanisms: adopt pseudo-random
function to realize ID information encryption, or dynamic update ID. Adopting pseudo-random
number increased the cost of tagging hardware, while the problems of data synchronization
should be paid attention to when adopting dynamic update ID [6].
9
7.7 Tag Content Change: If a tag is writeable, attackers can change its content, distorting item
attributes or leading the access-control system to falsely reject an authorized person. Furthermore,
they can insert malware—such as modified tag data that the reader interprets as a command into
writeable tags using, for example, SQL injection. In some writeable tags, developers can protect
memory content by temporarily or permanently disabling writing. Also, developers can
implement the readers so as to prevent them from interpreting a tag‘s data as a command.
7.8 Password decoding: As currently most RFID systems use encryption technology to ensure the
confidentiality and integrity of information delivery, attacking against the encryption algorithm is
a common form of attack. Attackers can decode encryption algorithms by conducting violent
attacks and the like, and decipher the intercepted cryptograph to get plain-text. To respond to this
attack, you need to design stronger encryption algorithm, or use longer keys increase the
difficulty of password cracking. Because of the constraint to the resource of RFID tags, traditional
encryption or signature algorithm is difficult to integrate into the tag. For this reason, many
international scholars work on low-cost RFID encryption algorithm. For example, Yuksel
proposed a low-cost 64-bit Hash function, only 1700 equivalent gates are required for the
realization [4]. The Feldhofer, proposed a 128-bit AES algorithm which requires only 3500
equivalent gates to be achieved, the algorithm is by far known the lowest cost AES program [5] .
10
see, there are a number of security protocols, or security flaws, or requires a lot of hardware
overhead, it is difficult to achieve in low-cost tag, not a low-power RFID system for low-cost
characteristics, to meet the security needs and practical security authentication mechanism.
Therefore, for low-cost low-power RFID system security research, is still a serious problem.
8.3 Design of the encryption algorithm which is applied to RFID system: Now most of the
authentication protocol are transmitted using encryption technology to ensure data security.
Although the traditional password techno cooked, but because of the special nature and limitations
of RFID tags, for example, tag generally don‘t have the microprocessor, just is made up of thousands
of logic gate circuit, limited storage space, limited power supply and so on, the traditional encryption
or signature algorithm is difficult to be integrated into such devices. The researchers gave a number
of simplified encryption algorithm, which although greatly reduced hardware costs, still exceeded
the capacity of low-cost tags. Therefore, we must design and implement low-cost and efficient
encryption algorithms fit for RFID systems.
9. CONCLUSION:
Due to the increasing number of RFID implementations, RFID security and privacy are increasingly
gaining more importance. Unfortunately, the wireless RFID communication is vulnerable for attacks,
which contributes to the delay of mass RFID adoption. Although RFID is becoming more
standardized, the current protection capabilities still lack in their abilities to counter or prevent RFID
threats and therefore gain acceptance in the commercial sector. But as RFID technology keeps
improving, security and privacy effectiveness will also grow. In the end it will take time for
protection capabilities to become more standardized and be implemented as part of a RFID system.
Of course, RFID system security threats and problems to be solved are not just those listed in this
report, along with the rapid development of RFID technology and applications, RFID system
security threats and attacks will increase and become more and more complex. Therefore, RFID
systems security technology is always an open issue, scholars and researchers need to make
unremitting efforts.
11
REFERENCES
[1] Hong Li, YongHui Chen and ZhangQing He ―The Survey of RFID Attacks and Defenses‖, 8th
International Conference on Wireless Communications, Networking and Mobile Computing , 2012
[2] R. Want,‖ An introduction to RFID technology‖, IEEE Pervasive Computing ( Volume: 5 , Issue:
1 , Jan.-March 2006 )
[3] Pawel Rotter, ―A Framework for Assessing RFID System Security and Privacy Risks”, IEEE
Pervasive Computing ( Volume: 7 , Issue: 2 , April-June 2008 )
[4] Yüksel K. ―Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications‖
Worcester: Dept. of Electronical Engineering, WPI, 2004(in American).
[5] Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer,‖Strong Authentication for RFID
Systems Using the AES Algorithm‖ Conference of Cryptographic Hardware and Embedded
Systems,2004: 357-370.
[6] Gurudatt Kulkarni ; Rupali Shelke ; Ramesh Sutar ; Sangita Mohite,‖ RFID security issues &
challenges”, International Conference on Electronics and Communication Systems (ICECS),2014
12