Sie sind auf Seite 1von 5

Emerging Standards

Editors: Ramaswamy Chandramouli, mouli@nist.gov


Tim Grance, tim.grance@nist.gov
Rick Kuhn, kuhn@nist.gov
Susan Landau, susan.landau@sun.com

Security Standards
for the RFID Market
It’s all about

O
riginally viewed as essentially remotely-readable TED PHILLIPS
the application Booz Allen
bar codes, radio frequency identification It’s not an easy task to design, engi- Hamilton
neer, implement, and optimize a
(RFID) technologies have been available for complex RFID system. When a pas- TOM
sive RFID tag moves down a con- KARYGIANNIS
many years. However, RFID technology re- veyor belt at 20 miles per hour, for AND R ICK
example, it has only a split second to KUHN
cently gained widespread public attention when European capture and use as much power as US National
possible from reader devices that can Institute of
retailers such as Great Britain’s Marks hackers. During the 2004 BlackHat be more than 10 centimeters away. Standards
& Spencer and Germany’s Metro conference in Las Vegas, Lukas Thus, the RFID system selected for and
Group began experimenting with Grunwald and Boris Wolf released this type of application will depend Technology
passive RFID tags embedded in indi- RFDump (www.rf-dump.org), an on the user’s requirements. Some ap-
vidual consumer products, and the open-source tool that allows anyone plications, however, require higher
US Department of Defense and Wal- to read RFID tags designed to the power demands and a lower toler-
Mart announced moves to use pas- ISO 15693 and 14443 standards as ance for latency, so the RFID sys-
sive RFID tags for shipment well as proprietary standards used in tems’ available power, amount of
tracking. Other large retailers fol- some smart-card financial transac- onboard data storage, radio fre-
lowed suit, suggesting that RFID tions. In 2005, researchers at Johns quency, and security requirements
technology will become nearly uni- Hopkins University also demon- will vary.
versal for shipment tracking in the strated that an inexpensive toolkit For example, let’s say a rancher
next few years. As RFID tags con- built with a minimal amount of cus- needs to identify and track individual
tinue to decrease in price while offer- tomized hardware can brute-force cattle from the ranch to the process-
ing increased capabilities, consumers cryptographic keys from one of the ing center. Given that cattle tend to
are encountering them in library most widely sold RFID tags.1 chew off ear tags while in the feedlot,
books, high-end electronics, auto-
mobile tires, and packaging for
household items. Efforts are cur- Introducing Emerging Standards
rently under way within the industry
that could provide unique identifiers
for every individual item in the retail
supply chain. As further evidence of
I EEE Security & Privacy announces the formation of a new department for
the magazine—Emerging Standards. Tim Grance, Ramaswamy
Chandramouli, and Rick Kuhn, of the US National Institute of Standards
RFID’s growth, the industry’s stan- and Technology, and Susan Landau from Sun Microsystems, are the co-
dards consortium, EPCglobal, re- editors of this department, which will concentrate on security issues arising
cently awarded Verisign a contract to from deployment of new technologies, with a focus on security standards
manage the Object Naming Service and research challenges. As systems are deployed, security issues must be
(ONS), which will serve as the root addressed—not only for the new technology, but also for the technology’s
directory for the EPCglobal Net- interaction with existing/legacy products and services. This department will
work, a system that combines passive highlight security challenges and solutions in the engineering and
RFID technology with electronic operation of new technologies as well as significant security concerns in
product codes (EPCs) to enable busi- existing technologies and applications. Topics include security solutions
ness partners to exchange informa- that are still evolving and areas where new algorithms are required to
tion throughout their supply chains. address vulnerabilities of existing security solutions. Contributions are
RFID has also attracted the at- welcome on these and other topics related to emerging technologies.
tention of security researchers and

PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/05/$20.00 © 2005 IEEE ■ IEEE SECURITY & PRIVACY 85
Emerging Standards

Types of RFID technology


R adio frequency identification (RFID) technology can be divided
into two main categories: Reader
Reader
RFID tag 0
1 Vcc 1 5
a1 b1
antenna Tag 2 a2 b2 6
• Passive systems, such as those used in gasoline station point-of-sale 3 a3 b3 7
antenna
systems and building access control systems, contain no onboard Host computer 4
a4 b4
8
GND
power source. Tags receive their operational power from RFID reader 0
devices. The tag’s antenna captures the radio frequency (RF) energy Integrated
from the reader, stores it in a capacitor, and then uses it to power the circuit
Enterprise
tag’s logic circuits. After completing the requested commands, the information system
tag uses the capacitor’s remaining energy to reflect or backscatter a
signal to the reader on a different frequency. Figure A. A radio frequency identification system. Such
• Active systems use tags with onboard power sources, such as batter- systems incorporate RFID readers, host computers to
ies. These tags are used for applications such as tracking cargo and control the readers, and back-end enterprise information
collecting tolls electronically. Active tags can support more sophisti- systems to implement business rules.
cated electronics with increased data storage, sensor interfaces, and
specialized functions. In addition, they use their batteries to trans-
mit signals back to the RFID reader. field longer than simpler tags. For active tags, security features result
in slower read times and potentially shorter battery life. Advanced
As Figure A shows, an RFID system includes more than just the RFID tags, including some with anti-tamper properties, are also
tag. Advanced security in RFID tags requires additional electronic finding their way into supply-chain applications, especially in inter-
components to support cryptographic processing, random number national commerce and the pharmaceutical industry.
generators, key management functions, and other security-specific The complexity of the RFID market provides a large variety of
features. This increases the amount of energy the tag consumes and security features in commercially available tags. However, security
increases the latency and transaction times. Passive tags that support features aren’t implemented in a consistent and interoperable
security functions must stay within the tag reader’s electromagnetic manner among different RFID technologies.

many ranchers now use implantable meet more demanding security re- moratorium on embedding RFID
low frequency (LF) tags enclosed in quirements are now in development. in drivers’ licenses and outlawed sur-
glass capsules because they’re less sus- reptitious interception of RFID
ceptible to attenuation from water Policy concerns signals. Responding to privacy con-
and living tissue than ultrahigh fre- Recognizing the growing concerns cerns, the American Electronics As-
quency (UHF) tags. Such a tracking of consumers and privacy advocates, sociation convinced legislators in
application requires RFID tags that as well as the relative weaknesses of September 2005 to set the bill aside
can be securely attached or implanted existing RFID security mechanisms, for at least a year while RFID secu-
in the animals, read through the skin lawmakers have started to explore rity and privacy technologies im-
from a relatively close distance to ways to protect consumer privacy. proved. Manufacturers recognize
minimize multiple reads, and have For example, the Identity Informa- that market success depends largely
limited onboard storage. In most tion Protection Act of 2005—a bill on their ability to convince con-
cases, these requirements narrow the introduced in the California legisla- sumers and legislators that RFID
RFID tag selection down to a single ture in 2004—proposed some of the products will preserve privacy while
product category—an encapsulated, first privacy regulations on the use of improving efficiency for retailers.
LF transponder that has limited RFID technology. Although busi- Businesses that implement RFID
read/write capability as specified by nesses would’ve been able to use security based on proprietary stan-
the ISO 11784 and 11785 standards. RFID to collect the information al- dards, such as those used in the
ISO 11784/5 transponders allow ready available from bar codes— point-of-sale systems, potentially in-
easy reprogramming of ID codes, product identification codes and troduce risk to their business and
however, and therefore provide insuf- serial numbers, for example—they customers because the “security
ficient security for applications such wouldn’t have been able to use the through obscurity” approach almost
as tracking endangered species or technology to track customers once always yields solutions that are easily
high-value show animals. Standards they left the store. The act also compromised. Fortunately, the
for animal-tracking RFID tags that would’ve established a temporary RFID industry is actively develop-

86 IEEE SECURITY & PRIVACY ■ NOVEMBER/DECEMBER 2005


Emerging Standards

ing international standards to meet read cycles. Authentication adds la- most, 2,000 gate equivalents. In
these security needs, such as incor- tency to the read/write process and contrast, common Data Encryption
porating the Advanced Encryption introduces key-management over- Standard (DES) implementations re-
Standard (AES) and designing ad- head. Other security measures, such quire tens of thousands of gates, and
vanced authentication techniques as those designed to protect data in- even lightweight AES implementa-
into some of the most extensively tegrity, have similar effects. The tions require approximately 5,000
used RFID systems. overall impact could be to reduce the gates,2 which puts them both out of
number of tags read per second in range for today’s first- and second-
Current crowded environments such as ware- generation passive EPC tags.
RFID standards houses, or increase the time per read Consumer fear over the prospect
RFID technology is exceedingly di- in high-speed conveyor belt systems. that RFID technology could be used
verse: more than 500 tag types are As RFID technology and stan- to surreptitiously read the product
commercially available, including dards continue to evolve, users will IDs of everything they’ve purchased,3
passive, semi-passive, active, semi- place an increasing emphasis on the along with pressure from privacy ad-
active, LF, HF, UHF, microwave, on- availability of security features in the vocates, led to the inclusion of the
board sensors, ruggedized housings, products they implement. Table 1 kill command in the EPC stan-
and implantable. As RFID technol- highlights the technical and security dard. This command, when sent to a
ogy evolves, standards are showing features of some important RFID single tag by a reader service, renders
an interesting interplay between cost standards. Several technical features it permanently inoperable. The ma-
and security. RFID applications fit have a direct effect on security, such jority of the logistics community op-
roughly into three categories: as frequency band, read range, and posed the command’s inclusion
onboard data capability. In addition, because of its potential for unautho-
• logistical applications that require most of the RFID standards have rized system disruption, but EPC-
fast, low-latency, easy-to-read tags defined one or more security fea- global included it in the Generation
with little or no need for security tures that provide confidentiality, in- 1 and Generation 2 standards to pro-
mechanisms, such as those used for tegrity, or availability services. tect consumer privacy. Executing the
shipping and receiving; kill command on individual Gen-
• consumer applications that require EPC tags eration 1 EPC tags is relatively sim-
security, but not bulk-reading ca- EPC tags are used for supply-chain ple—it’s protected by only an 8-bit
pabilities, such as smart cards used and logistical applications—to follow password and no key-management
in financial transactions; and razors on the journey from factory to infrastructure is available. Indeed,
• vertical applications that tailor secu- store, for example—because they’re making the situation worse, some
rity features to a specific business simple and cheap. The engineers major retailers reportedly ordered
process, such as the use of RFID- who wrote the EPC standards were millions of tags configured with the
enabled poker chips in casinos. focused on producing low-cost, low- same password. The EPC Genera-
latency tags with high potential read tion 2 standard, which will be im-
As RFID tag and infrastructure rates that supported tag singulation plemented in the first half of 2006,
costs have declined over the past (separating one tag from a large quan- requires longer passwords for pro-
decade, the potential range of RFID tity of tags). A critical design factor tecting the command, but there’s still
applications has expanded, making it was the physical tag configuration— no key-management function.
economical to embed RFID tags in these tags could be built on flexible
all sorts of consumer items. As a re- substrate material and laminated into Smart cards
sult, we now need tags with both smart labels. Security of EPC tags In contrast to EPC tags, the security
bulk-reading capabilities and secu- wasn’t initially a high priority. Thus, features in RFID-enabled, contact-
rity features that protect consumer first-generation EPC tags lack the less smart cards, which were driven
privacy. In addition, there continues computational resources for strong primarily by the banking commu-
to be a sizeable market for RFID sys- cryptographic authentication. Like nity’s needs for protecting wireless
tems with semi-custom or highly all passive RFID tags, first -genera- payment systems, addressed security
tailored security mechanisms. tion EPC tags draw power from radio issues from the beginning. None-
Yet, the addition of security signals emitted by tag readers. EPC theless, power issues are a significant
mechanisms doesn’t come without tags don’t have internal clocks, and concern for the RFID technology
potential trade-offs. Data encryption can’t perform any operations inde- used in contactless smart-card trans-
not only increases a tag’s cost, it re- pendently of tag readers. As a result, actions. Passive smart cards (follow-
duces the tag’s onboard storage ca- they can’t devote much computing ing the ISO 14443 and 15693
pacity and increases the latency of power to security operations—at standards) have implemented secu-

www.computer.org/security/ ■ IEEE SECURITY & PRIVACY 87


Emerging Standards

Table 1. Radio frequency identification security features.

TECHNOLOGY TECHNICAL FEATURES SECURITY FEATURES


BAND RANGE DATA CONFIDENTIALITY INTEGRITY AVAILABILITY
(METERS)

EPC Class 0/0+ Ultrahigh 3 64- or 96-bit None in standard. • Parity bit. Identification rate
(supply chain) frequency with read/write • CRC error detection. >1,000 tags/sec.
(UHF) (R/W) block
EPC Class 1 UHF 3 64- or 96-bit None in standard. • Commands have Lock command
Generation 1 with R/W block 5 parity bits. permanent and
(supply chain) • CRC error detection. not protected.
EPC Class 1 UHF 3 R/W block • Masked reader-to-tag • CRC error detection. Numerous readers
Generation 2 communications using the can operate in
(supply chain) one-time pad stream cipher. dense configurations.
• Tags addressed by
16-bit random numbers.
ISO/IEC Low < .010 Up to 1 • No protection on • CRC error detection. None in standard.
18000-2 frequency Kbyte R/W the read command. • Permanent, factory
(item (LF) • “Reader talks first” protocol. set 64-bit ID.
management) • No encryption • Optional, lockable
or authentication. identifier code.
ISO/IEC High <2 R/W • “Reader talks first” protocol. • CRC error detection. Multiple tag modes
18000-3 frequency • 48-bit password • No write are noninterferring.
(item (HF) protection on protection in
management) read commands. Mode 1.
• “Quiet mode” in which tags • Mode 2 has 48-bit
won’t respond to readers. password on
write commands.
ISO/IEC LF < .010 64-bit • “Reader talks first” protocol. • Retagging counter. None in standard.
11784-11785 identifier • Tags addressed by 16-bit • CRC error detection.
(animal random numbers.
tracking) • Quiet mode.
ISO/IEC 10536 HF <2 R/W • “Reader talks first” protocol. • CRC error detection. • Probabilistic/slotted
(contactless • Masked reader-to-tag random anti-
smart cards) communications. collision algorithm.
• Tags addressed by • Multiple tag modes
random number. are noninterfering.
• Quiet mode.
ISO/IEC 15693 HF 1.5 Up to • No protection on the • Optional protections Optional password
(vicinity smart 1Kbyte R/W read command. on write command. protection on the
cards) • No onboard encryption or • Error checking on lock command.
authentication. air interface.

rity features, including crypto- and security threats to these cards are ing their products and then extend
graphic challenge-response authen- still significant. Government and in- them with proprietary features tai-
tication, for years. Newer releases of dustry will continue to refine the lored for specific vertical applica-
these cards include the 128-bit AES, risk-mitigation strategies for these tions. For instance, Philips’ Mifare
triple-DES, and SHA-1 algorithms. cards over the coming years. technology, which is used exten-
As a result of the increased overhead, Few RFID smart cards on the sively in Europe for access to mass
the smart cards must be placed close market are built around “pure” transportation, is built around the
to their readers for relatively lengthy standards-based implementations. ISO 14443 air link standard but is
periods to be read. Despite these ad- Most vendors use the basic standard supplemented with a proprietary
vanced security features, the privacy suites as starting points for develop- data format and security features.

88 IEEE SECURITY & PRIVACY ■ NOVEMBER/DECEMBER 2005


Emerging Standards

Interoperability is also a concern secure system engineering princi- nis has a PhD in computer science from
for devices using RF. Some of the ples should become available. George Washington University. Contact
him at karygiannis@nist.gov.
unlicensed frequencies used for Security and privacy in RFID
RFID in the US are used for mobile tags aren’t just technical issues; im- Rick Kuhn is a computer scientist with the
phones in Europe and Asia, for ex- portant policy questions arise as US National Institute of Standards and
ample. Conformance testing and RFID tags join to create large sensor Technology. His research interests include
certification are essential for reduc- networks and bring us closer to information security, software verification
and testing, and empirical studies of soft-
ing interoperability problems with “ubiquitous computing.” With pub- ware failure. Kuhn has an MS in computer
any standard, even with the develop- lic attention focused on the RFID science from the University of Maryland
ment of multiprotocol, frequency- landscape, security and privacy have at College Park. He is a senior member of
agile reader devices. Most RFID moved to the forefront in RFID the IEEE and the IEEE Computer Society.
Contact him at kuhn@nist.gov.
testing is conducted under the standards work, and the results will
auspices of relevant industry groups. be worth watching.
For example, new ISO/Interna-
tional Electrotechnical Commission Acknowledgments
(IEC) 14443 contactless smart-card Certain commercial entities, equipment, or ma-
platforms might receive MasterCard terials may be identified in this article in order to
certification for use in e-commerce. describe an experimental procedure or concept
EPCglobal has recently contracted adequately. Such identification is not intended
with third-party laboratories to con- to imply recommendation or endorsement by
duct conformance testing for Gen- the US National Institute of Standards and
eration 2 EPC standards. At the same Technology, nor is it intended to imply that the
time, EPCglobal has established a entities, materials, or equipment are necessarily
working group to submit the EPC the best available for the purpose.
Generation 2 protocols for ISO stan-
dardization (ISO 18000-6c). Iron- References
ically, one risk of international 1. S.C. Bono et al., “Security Analy-
standardization is that a protocol sis of a Cryptographically-Enabled
might be modified as it moves RFID Device,” Proc. 14th Usenix
through the process, so the EPC Security Symp. Usenix Assoc., 2005,
group will try to maintain consis- pp. 1–16.
tency with the current specification. 2. O. Günther and S. Spiekermann,
“RFID and the Perception of
Control: The Consumer’s View,”

A s the RFID market expands,


we’ll see the continued prolifer-
ation of RFID tags built for highly
Comm. ACM, vol. 48, no. 9, 2005,
pp. 73–76.
3. A. Juels and S. Weis, “Authenticat-
specialized vertical markets, which ing Pervasive Devices with Human
means greater variety and the conse- Protocols,” Advances in Cryptology:
quent need to ensure interoperabil- Proc. 25th Int’l Cryptology Conf.,
ity. A great deal of research and LNCS 3126, V. Shoup, ed.,
development is currently under way Springer-Verlag, 2005, pp. 293–309.
in the RFID security field to miti-
gate both known and postulated Ted Phillips is a senior associate at Booz
Allen Hamilton. His research interests
risks. Manufacturers, business man- include RFID engineering, supply-chain
agers, and RFID systems engineers automation, and information security.
continue to weigh the trade-offs be- Phillips has an MS in telecommunications
tween chip size, cost, functionality, from Virginia Commonwealth University.
He is a member of the International Soci-
interoperability, security, and pri- ety of Logistics Engineers and EPCglobal.
vacy with the bottom-line impact Contact him at phillipsted@bah.com.
on business processes. In the coming
months, security features supporting Tom Karygiannis is a senior researcher
at the US National Institute of Standards
data confidentiality, tag-to-reader and Technology. His research interests
authentication, optimized RF pro- include wireless security, ad hoc net-
tocols, high-assurance readers, and works, and mobile commerce. Karygian-

www.computer.org/security/ ■ IEEE SECURITY & PRIVACY 89

Das könnte Ihnen auch gefallen