RFID Technical Tutorial RFID Technical Tutorial Presented by: Dale - - PowerPoint PPT Presentation

rfid technical tutorial rfid technical tutorial
SMART_READER_LITE
LIVE PREVIEW

RFID Technical Tutorial RFID Technical Tutorial Presented by: Dale - - PowerPoint PPT Presentation

RFID Technical Tutorial RFID Technical Tutorial Presented by: Dale R. Thompson Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering Dept. of Computer Science and Computer Engineering University of Arkansas


slide-1
SLIDE 1

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 1 1

RFID Technical Tutorial RFID Technical Tutorial

Presented by: Dale R. Thompson Presented by: Dale R. Thompson

  • Dept. of Computer Science and Computer Engineering
  • Dept. of Computer Science and Computer Engineering

University of Arkansas University of Arkansas

slide-2
SLIDE 2

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 2 2

Goals Goals

  • Understand the details of RFID with focus

Understand the details of RFID with focus

  • n EPCglobal UHF Class
  • n EPCglobal UHF Class-
  • 1 Generation

1 Generation-

  • 2

2 (Gen (Gen-

  • 2) passive tags being introduced into

2) passive tags being introduced into retail. retail.

  • Introduce the security threats

Introduce the security threats to to RFID and RFID and the privacy threats the privacy threats by by RFID. RFID.

  • Convince you that Privacy Assurance is

Convince you that Privacy Assurance is necessary. necessary.

slide-3
SLIDE 3

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 3 3

University of Arkansas RFID University of Arkansas RFID Research Center Research Center

  • Fully student staffed with 24 industry members, which recently b

Fully student staffed with 24 industry members, which recently became the ecame the first open laboratory to be accredited by EPCglobal Inc. first open laboratory to be accredited by EPCglobal Inc.

slide-4
SLIDE 4

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 4 4

What is RFID? What is RFID?

  • Stands for Radio Frequency Identification

Stands for Radio Frequency Identification

  • Uses radio waves for identification

Uses radio waves for identification

  • New frontier in the field of information

New frontier in the field of information technology technology

  • One form of Automatic Identification

One form of Automatic Identification

  • Provides unique identification or serial

Provides unique identification or serial number of an object (pallets, cases, items, number of an object (pallets, cases, items, animals, humans) animals, humans)

slide-5
SLIDE 5

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 5 5

Applications Applications

  • Mobil Speedpass systems

Mobil Speedpass systems

  • Automobile Immobilizer

Automobile Immobilizer systems systems

  • Fast

Fast-

  • lane and E

lane and E-

  • Zpass road

Zpass road toll system toll system

  • Secure Entry cards

Secure Entry cards

  • Animal Identification

Animal Identification

  • Humans

Humans

  • Supply chain management

Supply chain management

slide-6
SLIDE 6

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 6 6

RFID System RFID System

slide-7
SLIDE 7

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 7 7

RFID Reader RFID Reader

  • Also known an interrogator

Also known an interrogator

  • Reader powers passive tags with RF energy

Reader powers passive tags with RF energy

  • Can be handheld or stationary

Can be handheld or stationary

  • Consists of:

Consists of:

– – Transceiver Transceiver – – Antenna Antenna – – Microprocessor Microprocessor – – Network interface Network interface

slide-8
SLIDE 8

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 8 8

RFID Frequency range RFID Frequency range

SHF SHF 5.725 5.725 – – 5.875 GHz 5.875 GHz SHF SHF 2.4 2.4 – – 2.483 GHz 2.483 GHz

UHF UHF 902 902 – – 928 MHz 928 MHz UHF UHF 868 868 – – 870 MHz 870 MHz

UHF UHF 433 MHz 433 MHz HF HF 26.957 26.957 – – 27. 283 MHz

  • 27. 283 MHz

HF HF 13.553 13.553 – – 13.567 MHz 13.567 MHz HF HF 7.4 7.4 – – 8.8 MHz 8.8 MHz HF HF 6.765 6.765 – – 6.795 MHz 6.795 MHz Low frequency Low frequency < 135 KHz < 135 KHz

Description Description Frequency Band Frequency Band

slide-9
SLIDE 9

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 9 9

FCC Rules for ISM Band Wireless FCC Rules for ISM Band Wireless Equipment Equipment

  • Federal Communications Commission

Federal Communications Commission (FCC) regulates frequencies in United (FCC) regulates frequencies in United States States

  • FCC regulations appear in title 47 of the

FCC regulations appear in title 47 of the United States Code of Federal Regulations United States Code of Federal Regulations (47CFR) and radio spectrum issues are the (47CFR) and radio spectrum issues are the subject of part 15 of the FCC rules subject of part 15 of the FCC rules

  • Industrial, Scientific and Medical (ISM)

Industrial, Scientific and Medical (ISM) devices devices

slide-10
SLIDE 10

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 10 10

FCC Rules for 902 FCC Rules for 902-

  • 928 MHz

928 MHz

  • Maximum transmitter power limited to 1 watt for

Maximum transmitter power limited to 1 watt for systems that frequency hop across at least 50 systems that frequency hop across at least 50 channels (Gen channels (Gen-

  • 2 readers typically run 1 watt and

2 readers typically run 1 watt and frequency hop across 50 channels) frequency hop across 50 channels)

  • Maximum EIRP (effective isotropic radiated

Maximum EIRP (effective isotropic radiated power) is limited to 4 watts (36 power) is limited to 4 watts (36 dBm dBm). For ). For antenna gain greater than 6 antenna gain greater than 6 dBi dBi must reduce must reduce

  • power. (For 1 watt reader transmitter the
  • power. (For 1 watt reader transmitter the

maximum gain antenna can be up to 6 maximum gain antenna can be up to 6 dBI dBI .) .)

  • When frequency hopping, the transmitter must

When frequency hopping, the transmitter must not use one frequency greater than 0.40 not use one frequency greater than 0.40 seconds within a 20 second period seconds within a 20 second period

slide-11
SLIDE 11

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 11 11

RFID Tag RFID Tag

  • Tag is a device used to transmit

Tag is a device used to transmit information such as a serial number to the information such as a serial number to the reader in a contact less manner reader in a contact less manner

  • Classified as :

Classified as :

– – Passive Passive – – energy from reader energy from reader – – Active Active -

  • battery

battery – – Semi Semi-

  • passive

passive – – battery and energy from battery and energy from reader reader

slide-12
SLIDE 12

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 12 12

Printers Printers

slide-13
SLIDE 13

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 13 13

Middleware Middleware

  • Each reader manufacturer

Each reader manufacturer

  • Commercial middleware

Commercial middleware

  • Open source middleware work at UofA

Open source middleware work at UofA

slide-14
SLIDE 14

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 14 14

Database Database

  • Store attributes related to the serial

Store attributes related to the serial number of the RFID tag number of the RFID tag

  • Examples

Examples

– – What is it? What is it? – – Who made it? Who made it? – – Who bought it? Who bought it? – – Where has it been? Where has it been?

slide-15
SLIDE 15

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 15 15

Contactless Contactless Smart Cards Smart Cards

  • ISO 7618

ISO 7618 -

  • A set of international standards covering the

A set of international standards covering the basic characteristics of basic characteristics of contactless contactless smart cards, such as smart cards, such as physical and electrical characteristics, communication physical and electrical characteristics, communication protocols and others. protocols and others.

  • Proximity Smart Cards (13.56 MHz)

Proximity Smart Cards (13.56 MHz)

– – Range = 4 inches (10 centimeter) Range = 4 inches (10 centimeter) – – Baud rate = 106 Baud rate = 106 kilobaud kilobaud – – ISO/IEC 14443 ISO/IEC 14443

  • Vicinity Smart Cards (13.56 MHz)

Vicinity Smart Cards (13.56 MHz)

– – Range = 3 feet (1 meter) Range = 3 feet (1 meter) – – Baud rate = 26.48 Baud rate = 26.48 kilobaud kilobaud – – ISO/IEC 15693 ISO/IEC 15693

slide-16
SLIDE 16

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 16 16

Animal Identification Standards Animal Identification Standards

  • International standard 134.2 kHz

International standard 134.2 kHz

– – ISO 11784: ISO 11784: “ “Radio Radio-

  • frequency identification of

frequency identification of animals animals” ” – – code structure code structure – – ISO 11785: ISO 11785: “ “Radio Radio-

  • frequency identification of

frequency identification of animals animals” ” – – Technical concept Technical concept – – ISO 14223: ISO 14223: “ “Radio Radio-

  • frequency identification of

frequency identification of animals animals” ” – – Advanced transponders Advanced transponders

  • U.S. standard 125 kHz

U.S. standard 125 kHz

  • At these frequencies the RF can penetrate mud,

At these frequencies the RF can penetrate mud, blood, and water blood, and water

slide-17
SLIDE 17

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 17 17

VeriChip VeriChip

  • Human implantable RFID tag operating at about 134 KHz because at

Human implantable RFID tag operating at about 134 KHz because at these frequencies the RF can penetrate mud, blood, and water these frequencies the RF can penetrate mud, blood, and water

  • About the size of uncooked grain of rice

About the size of uncooked grain of rice

  • Oct. 22, 2002
  • Oct. 22, 2002 –

– US Food and Drug Administration ruled US Food and Drug Administration ruled VeriChip VeriChip not not regulated device regulated device

  • Oct. 2004
  • Oct. 2004 –

– FDA ruled serial number in FDA ruled serial number in VeriChip VeriChip could be linked to could be linked to healthcare information healthcare information

  • Healthcare applications

Healthcare applications

– – Implanted medical device identification Implanted medical device identification – – Emergency access to patient Emergency access to patient-

  • supplied health information

supplied health information – – Portable medical records access including insurance information Portable medical records access including insurance information – – In In-

  • hospital patient identification

hospital patient identification – – Medical facility connectivity via patient Medical facility connectivity via patient – – Disease/treatment management of at Disease/treatment management of at-

  • risk populations (such as

risk populations (such as vaccination history) vaccination history)

slide-18
SLIDE 18

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 18 18

Supply Chain Management Supply Chain Management

  • RFID adds visibility as the items flow through the supply

RFID adds visibility as the items flow through the supply chain from the manufacturer, shippers, distributors, and chain from the manufacturer, shippers, distributors, and retailers. retailers.

  • The added visibility can identify bottlenecks and save

The added visibility can identify bottlenecks and save money. money.

  • Wal

Wal-

  • Mart requested in June 2003 that their top 100

Mart requested in June 2003 that their top 100 suppliers use RFID at the pallet and case level by suppliers use RFID at the pallet and case level by January 2005. January 2005.

  • Wal

Wal-

  • Mart currently has 300 suppliers sending products to

Mart currently has 300 suppliers sending products to 500 RFID 500 RFID-

  • enabled Wal

enabled Wal-

  • Mart and Sam's Club stores.*

Mart and Sam's Club stores.*

  • Wal

Wal-

  • Mart wants 1,000 stores with RFID by January

Mart wants 1,000 stores with RFID by January 2007.* 2007.*

* Source: http://www.extremerfid.com/article/WalMart+ Forges+ Ahead * Source: http://www.extremerfid.com/article/WalMart+ Forges+ Ahead+ with+ RFID/172888_1.aspx + with+ RFID/172888_1.aspx

slide-19
SLIDE 19

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 19 19

Does RFID Reduce Out of Stocks? Does RFID Reduce Out of Stocks? A Preliminary Analysis A Preliminary Analysis

  • Study by UA RFID Research Center

Study by UA RFID Research Center

  • Authors: Bill C. Hardgrave, Matthew Waller, Robert

Authors: Bill C. Hardgrave, Matthew Waller, Robert Miller, University of Arkansas Miller, University of Arkansas

  • From February 14 to September 12, 2005, out of stocks

From February 14 to September 12, 2005, out of stocks were examined daily in 24 Wal were examined daily in 24 Wal-

  • Mart stores (12 RFID

Mart stores (12 RFID-

  • enabled stores, 12 control stores)

enabled stores, 12 control stores)

  • RFID reduced out

RFID reduced out-

  • of
  • f-
  • stocks by approximately 16%

stocks by approximately 16% because RFID was able to identify if items were in the because RFID was able to identify if items were in the back room back room

  • http://

http:// itri.uark.edu/research/display.asp?article itri.uark.edu/research/display.asp?article= ITRI = ITRI -

  • WP058

WP058-

  • 1105

1105

slide-20
SLIDE 20

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 20 20

Standardization Item Management Standardization Item Management

  • ISO/IEC [International Standards Organization (ISO),

ISO/IEC [International Standards Organization (ISO), www.iso.org www.iso.org] and ] and International International Electrotechnical Electrotechnical Commission, Commission, www.iec.ch www.iec.ch ] ]

– – 18000 18000– –1: Generic air interfaces for globally accepted frequencies 1: Generic air interfaces for globally accepted frequencies – – 18000 18000– –2: Air interface for 135 KHz 2: Air interface for 135 KHz – – 18000 18000– –3: Air interface for 13.56 MHz 3: Air interface for 13.56 MHz – – 18000 18000– –4: Air interface for 2.45 GHz 4: Air interface for 2.45 GHz – – 18000 18000– –5: Air interface for 5.8 GHz 5: Air interface for 5.8 GHz – – 18000 18000– –6: Air interface for 860 MHz to 930 MHz 6: Air interface for 860 MHz to 930 MHz – – 18000 18000– –7: Air interface at 433.92 MHz 7: Air interface at 433.92 MHz

  • EPCglobal Inc.,

EPCglobal Inc., www.epcglobalinc.com www.epcglobalinc.com

– – HF (13.56 MHz) HF (13.56 MHz)

  • 13.56 MHz ISM Band Class 1

13.56 MHz ISM Band Class 1

– – UHF (868 UHF (868 – – 928 MHz) 928 MHz)

  • UHF Class

UHF Class-

  • UHF Class

UHF Class-

  • 1 Generation

1 Generation-

  • 1 (Class

1 (Class-

  • 1 Gen

1 Gen-

  • 1)

1)

  • UHF Class

UHF Class-

  • 1 Generation

1 Generation-

  • 2 (Class

2 (Class-

  • 1 Gen

1 Gen-

  • 2)

2)

– – Moving toward ISO 18000 Moving toward ISO 18000-

  • 6C

6C

slide-21
SLIDE 21

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 21 21

EPCglobal, Inc. EPCglobal, Inc.

  • Not

Not-

  • for

for-

  • profit organization developing

profit organization developing commercial, world commercial, world-

  • wide RFID standards

wide RFID standards

  • Joint venture between EAN International and the

Joint venture between EAN International and the Uniform Code Council (UCC). Uniform Code Council (UCC).

– – UCC standardized Universal Product Code (UPC) UCC standardized Universal Product Code (UPC) barcodes in US barcodes in US – – EAN standardized barcodes in Europe EAN standardized barcodes in Europe – – UCC and EAN combined to form GS1 UCC and EAN combined to form GS1

  • http://www.epcglobalinc.org/

http://www.epcglobalinc.org/

  • UHF Class

UHF Class-

  • 1 Generation

1 Generation-

  • 2 (Class

2 (Class-

  • 1 Gen

1 Gen-

  • 2 or

2 or commonly known as Gen commonly known as Gen-

  • 2)

2)

– – In process of becoming ISO 18000 In process of becoming ISO 18000-

  • 6C standard

6C standard

slide-22
SLIDE 22

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 22 22

Electronic Product Code (EPC) Electronic Product Code (EPC)

96 bits can uniquely label all products for the next 1,000 years

slide-23
SLIDE 23

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 23 23

EPC vs. EPC vs. UPC (Barcodes) UPC (Barcodes)

  • Both are forms of Automatic identification

Both are forms of Automatic identification technologies technologies

  • Universal Product Code (UPC) require line of

Universal Product Code (UPC) require line of sight and manual scanning whereas EPC do not sight and manual scanning whereas EPC do not

  • UPC require optical reader to read whereas EPC

UPC require optical reader to read whereas EPC reader reads via radio waves reader reads via radio waves

  • EPC tags possess a memory and can be written

EPC tags possess a memory and can be written while UPC do not while UPC do not

  • EPC tags cost 5 cents, UPC tags cost 1/10 cent

EPC tags cost 5 cents, UPC tags cost 1/10 cent

slide-24
SLIDE 24

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 24 24

EPCglobal Inc. UHF Specification EPCglobal Inc. UHF Specification History History

  • EPCglobal UHF Class

EPCglobal UHF Class-

  • EPCglobal UHF Class

EPCglobal UHF Class-

  • 1 Generation

1 Generation-

  • 1

1

  • EPCglobal UHF Class

EPCglobal UHF Class-

  • 1 Gen

1 Gen-

  • 2 (Gen

2 (Gen-

  • 2)

2)

– – In process of becoming ISO 18000 In process of becoming ISO 18000-

  • 6C

6C standard standard – – Item management standard Item management standard – – Retail standard Retail standard

slide-25
SLIDE 25

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 25 25

EPCglobal UHF Class EPCglobal UHF Class-

  • 1 Gen

1 Gen-

  • 2 Reader

2 Reader-

  • to

to-

  • Tag

Tag Physical and Link Layers Physical and Link Layers

  • Modulation

Modulation

– – Double sideband amplitude shift keying (DSB Double sideband amplitude shift keying (DSB-

  • ASK)

ASK) – – Single Single-

  • sideband ASK (SSB

sideband ASK (SSB-

  • ASK)

ASK) – – Phase reversal ASK (PR Phase reversal ASK (PR-

  • ASK)

ASK)

  • Encoding

Encoding -

  • Pulse interval encoding (PIE)

Pulse interval encoding (PIE)

  • Data rate based on

Data rate based on Tari Tari

– – Tari Tari 25 microsecond (TYPICAL SETTING) 25 microsecond (TYPICAL SETTING)

  • 40 Kilobits per second (Kbps) maximum

40 Kilobits per second (Kbps) maximum

  • 27 Kbps average

27 Kbps average

– – Tari Tari 12.5 microsecond 12.5 microsecond

  • 80 Kbps maximum

80 Kbps maximum

  • 53 Kbps average

53 Kbps average

– – Tari Tari 6.25 microsecond 6.25 microsecond

  • 160 Kbps maximum

160 Kbps maximum

  • 107 Kbps average

107 Kbps average

slide-26
SLIDE 26

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 26 26

PIE Encoding PIE Encoding

slide-27
SLIDE 27

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 27 27

EPCglobal UHF Class EPCglobal UHF Class-

  • 1 Gen

1 Gen-

  • 2 Tag

2 Tag-

  • to

to-

  • Reader

Reader Physical and Link Layers Physical and Link Layers

  • Backscatter modulation

Backscatter modulation

– – Varies reflection coefficient of antenna Varies reflection coefficient of antenna – – Switch load on antenna in time with bits, which varies input imp Switch load on antenna in time with bits, which varies input impedance edance – – Varies amount of energy reflected from tag to reader Varies amount of energy reflected from tag to reader – – 80 to 90 dB less signal than reader 80 to 90 dB less signal than reader-

  • to

to-

  • tag (10,000 times weaker!)

tag (10,000 times weaker!)

  • Modulation

Modulation

– – Amplitude shift keying (ASK) Amplitude shift keying (ASK) – – Phase shift keying (PSK) Phase shift keying (PSK)

  • Encoding

Encoding – – Reader chooses type Reader chooses type

– – FM0 FM0 – – Miller (M= 2, 4, or 8) Miller (M= 2, 4, or 8)

  • Data rates are variable

Data rates are variable

– – FM0 [single reader mode] FM0 [single reader mode] – – 40 Kbps up to 640 Kbps 40 Kbps up to 640 Kbps – – Miller (M= 2) [multi Miller (M= 2) [multi-

  • reader mode]

reader mode] – – 20 Kbps up to 320 Kbps 20 Kbps up to 320 Kbps – – Miller (M= 4) [dense reader mode] Miller (M= 4) [dense reader mode] – – 10 Kbps up to 160 Kbps 10 Kbps up to 160 Kbps – – Miller (M= 8) Miller (M= 8) – – 5 Kbps up to 80 Kbps 5 Kbps up to 80 Kbps – – Typical rates in the lab vary between 60 Typical rates in the lab vary between 60-

  • 70 Kbps using Miller (M= 4)

70 Kbps using Miller (M= 4)

slide-28
SLIDE 28

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 28 28

Class Class-

  • 1 Gen

1 Gen-

  • 2 Anti

2 Anti-

  • Collision

Collision Protocol (media access control) Protocol (media access control)

  • Select phase

Select phase

– – Single out particular tag population with one or more bits with Single out particular tag population with one or more bits with query tree query tree protocol protocol

  • Inventory phase

Inventory phase – – identify individual tag using Q protocol (slotted identify individual tag using Q protocol (slotted-

  • aloha

aloha based) based)

– – Reader sends Query with parameter Q and Session number (Q= 4 is s Reader sends Query with parameter Q and Session number (Q= 4 is suggested uggested default) default) – – Reader creates slotted time Reader creates slotted time – – Tags pick random 16 Tags pick random 16-

  • bit number for

bit number for handle handle – – Tags in requested session pick a random number in the range [0,2 Tags in requested session pick a random number in the range [0,2^ Q ^ Q-

  • 1] for

1] for slot_number slot_number – – If If slot_number slot_number = 0, backscatter = 0, backscatter handle handle – – If If slot_number slot_number != 0, wait that number of slots to backscatter != 0, wait that number of slots to backscatter handle handle – – Reader Reader ACKs ACKs individual tag with individual tag with handle handle and goes to access phase. All other tags and goes to access phase. All other tags wait. wait. – – If more that one tag answers, reader can send same Q again or se If more that one tag answers, reader can send same Q again or send modified Q nd modified Q

  • Access phase

Access phase

– – Reader interacts with tags requesting EPC number and any other i Reader interacts with tags requesting EPC number and any other information nformation

slide-29
SLIDE 29

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 29 29

Class Class-

  • 1 Gen

1 Gen-

  • 2 Select (Query Tree)

2 Select (Query Tree)

Tag3 (ID = 100) 011 011 Tag2 (ID = 011) 010 010 Tag1 (ID = 010) collision no answer collision Tag-to-Reader 01* 00* 0** Reader-to-Tag 5 4 3 2 1 Time slice 100 Tag3 (ID = 100) 011 Tag2 (ID = 011) 010 Tag1 (ID = 010) 100 011 010 Tag-to-Reader 1** 011 010 Reader-to-Tag 11 10 9 8 7 6 Time slice

slide-30
SLIDE 30

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 30 30

Class Class-

  • 1 Gen

1 Gen-

  • 2 Select (Query Tree)

2 Select (Query Tree)

slide-31
SLIDE 31

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 31 31

Class Class-

  • 1 Gen

1 Gen-

  • 2 Inventory

2 Inventory (Q protocol, form of slotted Aloha) (Q protocol, form of slotted Aloha)

handle3 slot=1 Tag3 handle2 slot=1 Tag2 EPC1 handle1 slot=0 Tag1 EPC1 empty empty collision handle1 Tag-to-Reader ACK handle1 Query Q=2 Reader-to-Tag 3 2 1 Slot number 7 6 5 4 3 2 1 Time slice handle3 slot=3 Tag3 (ID = 100) EPC2 handle2 slot=1 Tag2 (ID = 011) wait Tag1 (ID = 010) EPC2 handle3 empty handle2 empty Tag-to-Reader ACK handle2 QueryAdjust Reader-to-Tag 3 2 1 Slot number 15 14 13 12 11 10 9 8 Time slice

slide-32
SLIDE 32

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 32 32

Class Class-

  • 1 Gen

1 Gen-

  • 2 Security

2 Security

  • Ability to generate 16

Ability to generate 16-

  • bit pseudo

bit pseudo-

  • random

random number number

– – Handle for singulation (better than using EPC) Handle for singulation (better than using EPC) – – Encrypt (obscure) reader Encrypt (obscure) reader-

  • to

to-

  • tag link

tag link – – Pick slots in Q protocol Pick slots in Q protocol

  • 16

16-

  • bit CRC for error detection

bit CRC for error detection

  • 32

32-

  • bit access password

bit access password

  • 32

32-

  • bit kill password

bit kill password

slide-33
SLIDE 33

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 33 33

Trivia on Passive UHF RFID Trivia on Passive UHF RFID

  • How far can a reader read a tag?

How far can a reader read a tag?

– – Less than 20 feet using legal equipment Less than 20 feet using legal equipment

  • What causes interference at these

What causes interference at these frequencies? frequencies?

– – Metal reflects the energy and can shield Metal reflects the energy and can shield – – Water absorbs the energy. Microwaves Water absorbs the energy. Microwaves

  • perate at 2.4 GHz because water absorbs
  • perate at 2.4 GHz because water absorbs

energy at these frequencies. Passive UHF energy at these frequencies. Passive UHF

  • perates around 900 MHz, which is close
  • perates around 900 MHz, which is close

enough. enough.

slide-34
SLIDE 34

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 34 34

Hacking Cryptographically Hacking Cryptographically-

  • Enabled

Enabled RFID Device RFID Device

  • Team at Johns Hopkins University reverse

Team at Johns Hopkins University reverse engineer Texas Instrument engineer Texas Instrument’ ’s Digital s Digital Signature Transponder Signature Transponder

– – Paid for gas with cloned RFID tag Paid for gas with cloned RFID tag – – Started car with cloned RFID tag Started car with cloned RFID tag

  • Lessons

Lessons

– – Security by obscurity does not work Security by obscurity does not work – – Use standard cryptographic algorithms with Use standard cryptographic algorithms with sufficient key lengths sufficient key lengths

slide-35
SLIDE 35

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 35 35

RFID RFID-

  • enabled Passport

enabled Passport

  • May 2002: The Enhanced Border Security and Visa Entry Reform Act

May 2002: The Enhanced Border Security and Visa Entry Reform Act requires the requires the USA and other countries whose citizens don't need visas for ente USA and other countries whose citizens don't need visas for entering the USA to ring the USA to develop electronic passports. The act sets a deadline of October develop electronic passports. The act sets a deadline of October 2004. 2004.

  • March 2004: The Bush administration asks Congress to delay the d

March 2004: The Bush administration asks Congress to delay the deadline to October eadline to October 2006 to allow participating countries more time to address techn 2006 to allow participating countries more time to address technical issues. Congress ical issues. Congress agrees. agrees.

  • January 2005

January 2005 -

  • US Government Awards RFID Passport Contracts for testing RFID

US Government Awards RFID Passport Contracts for testing RFID passports passports

  • April 2005: The State Department closes comment period, begins t

April 2005: The State Department closes comment period, begins to firm up plans for

  • firm up plans for

the new e the new e-

  • passport.

passport.

  • April 2005

April 2005 – – State Department reconsiders adding security measures to State Department reconsiders adding security measures to RFID RFID-

  • enabled passports after public outcry because can be read at 30

enabled passports after public outcry because can be read at 30 feet feet (10 meters) instead of 4 inches (10 cm) [ISO 14443] (10 meters) instead of 4 inches (10 cm) [ISO 14443]

  • August 2005

August 2005 – – State Department adds metallic ant State Department adds metallic ant-

  • skimming material to cover and

skimming material to cover and spine of passport to limit reading distance to 1 inch spine of passport to limit reading distance to 1 inch

  • November 2005: State Department plans to make e

November 2005: State Department plans to make e-

  • passports available to U.S.

passports available to U.S. travelers by October 2006 that have features to prevent skimming travelers by October 2006 that have features to prevent skimming and Basic Access and Basic Access Control (characters printed on passport act like PIN number) Control (characters printed on passport act like PIN number) – – Before being read PIN must be entered into reader Before being read PIN must be entered into reader – – Encryption between reader and tag Encryption between reader and tag

  • October 2005: E

October 2005: E-

  • passports available for U.S. travelers

passports available for U.S. travelers

slide-36
SLIDE 36

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 36 36

RFID RFID-

  • enabled passport

enabled passport

  • Metallic anti

Metallic anti-

  • skimming material added in

skimming material added in cover and spine to reduce read distance to cover and spine to reduce read distance to 1 inch 1 inch

  • PIN number printed on cover must be

PIN number printed on cover must be entered in reader to read tag and it entered in reader to read tag and it encrypts communication encrypts communication

  • New industry for wallet makers creating

New industry for wallet makers creating Faraday cages for passports Faraday cages for passports

slide-37
SLIDE 37

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 37 37

Passport Solution! Passport Solution!

slide-38
SLIDE 38

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 38 38

RFDump RFDump

  • Open source software tool for RFID ISO

Open source software tool for RFID ISO-

  • 15693 and ISO

15693 and ISO-

  • 14443 readers (13.56

14443 readers (13.56 MHz) MHz)

– – Read/write data on RFID tags Read/write data on RFID tags – – Integrated cookie feature Integrated cookie feature

  • Add cookie to tag and automatically increment

Add cookie to tag and automatically increment counter when tag is in range of reader counter when tag is in range of reader

  • Track number of times shopper enters reader field

Track number of times shopper enters reader field

  • r picks up item
  • r picks up item

– – www.rf www.rf-

  • dump.org

dump.org

slide-39
SLIDE 39

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 39 39

RFID Virus RFID Virus

  • M. R.
  • M. R. Rieback

Rieback, B. , B. Crispo Crispo, and A. S. , and A. S. Tanenbaum Tanenbaum, , “ “Is your cat infected with a Is your cat infected with a computer virus?, computer virus?,” ” in in Proc. IEEE Int

  • Proc. IEEE Int’

’l. Conf.

  • l. Conf.

Pervasive Computing and Communications Pervasive Computing and Communications ( (PerCom PerCom) ), Pisa, Italy, Mar. 13 , Pisa, Italy, Mar. 13-

  • 17, 2006.

17, 2006.

  • More to do with attack against RFID

More to do with attack against RFID middleware software than RFID middleware software than RFID

– – SQL injection attack SQL injection attack – – Buffer overflow attack Buffer overflow attack

slide-40
SLIDE 40

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 40 40

RFID Security and Privacy Threats RFID Security and Privacy Threats

  • Security threats

Security threats to to the RFID system the RFID system

  • Privacy threats

Privacy threats by by the RFID system the RFID system

slide-41
SLIDE 41

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 41 41

Threat Modeling Threat Modeling

  • Assemble team

Assemble team

  • Decompose system into threat targets

Decompose system into threat targets

  • Identify/Categorize threats to threat

Identify/Categorize threats to threat targets targets

  • Attack graphs for each threat target

Attack graphs for each threat target

  • Assign risk to each threat

Assign risk to each threat

  • Sort threats

Sort threats

  • Mitigate threats with higher risks

Mitigate threats with higher risks

slide-42
SLIDE 42

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 42 42

Security Threats Categorized with Security Threats Categorized with STRIDE STRIDE

  • S

Spoofing identity poofing identity

  • T

Tampering with data ampering with data

  • R

Repudiation epudiation

  • I

I nformation disclosure nformation disclosure

  • D

Denial of service enial of service

  • E

Elevation of privilege levation of privilege

slide-43
SLIDE 43

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 43 43

STRIDE Categories and Mitigation Techniques STRIDE Categories and Mitigation Techniques

Run with least privilege Elevation of privilege Appropriate authentication Appropriate authorization Filtering Throttling Quality of Service Denial of service Authorization Privacy-enhanced protocols Encryption Protect secrets Don’t store secrets Information disclosure Digital signatures Timestamps Audit trails Repudiation Appropriate authentication Hashes Message authentication codes Digital signatures Tamper-resistant protocols Tampering with data Appropriate authentication Protect secrets Don’t store secrets Spoofing identity Techniques Category

slide-44
SLIDE 44

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 44 44

Security Threats Security Threats to to RFID RFID

  • A competitor or thief performs an unauthorized inventory

A competitor or thief performs an unauthorized inventory

  • f a store by scanning tags with an unauthorized reader
  • f a store by scanning tags with an unauthorized reader

to determine the types and quantities of items. to determine the types and quantities of items.

– – Spoofing Spoofing – – Information disclosure Information disclosure

  • An attacker modifies the EPC number on tags or kills

An attacker modifies the EPC number on tags or kills tags in the supply chain, warehouse, or store disrupting tags in the supply chain, warehouse, or store disrupting business operations and causing a loss of revenue. business operations and causing a loss of revenue.

– – Tampering with data Tampering with data – – Denial of service Denial of service

  • An attacker modifies a high

An attacker modifies a high-

  • priced item

priced item’ ’s EPC number to s EPC number to be the EPC number of a lower cost item. be the EPC number of a lower cost item.

– – Tampering with data Tampering with data

slide-45
SLIDE 45

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 45 45

Privacy Threats Privacy Threats by by RFID RFID

  • A bomb in a restaurant explodes when there are five or more

A bomb in a restaurant explodes when there are five or more Americans with RFID Americans with RFID-

  • enabled passports detected.

enabled passports detected.

  • A mugger marks a potential victim by querying the tags in

A mugger marks a potential victim by querying the tags in possession of an individual. possession of an individual.

  • A fixed reader at any retail counter could identify the tags of

A fixed reader at any retail counter could identify the tags of a a person and show the similar products on the nearby screen to a person and show the similar products on the nearby screen to a person to provide individualized marketing. person to provide individualized marketing.

  • A sufficiently powerful directed reader reads tags in your house

A sufficiently powerful directed reader reads tags in your house or

  • r

car. car.

– – The ISO 14443 standard proposed for passports specifies about 4 The ISO 14443 standard proposed for passports specifies about 4 inches (10 cm) as the typical range. However, NIST with a specia inches (10 cm) as the typical range. However, NIST with a special l purpose antenna read it at 30 feet (10 meters)! purpose antenna read it at 30 feet (10 meters)!

  • RFID enables tracking, profiling, and

RFID enables tracking, profiling, and surveillance of individuals on a large scale. surveillance of individuals on a large scale.

slide-46
SLIDE 46

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 46 46

Top Privacy Threats by RFID Top Privacy Threats by RFID

  • Tracking

Tracking – – Determine where individuals Determine where individuals are and where they have been are and where they have been

  • Hotlisting

Hotlisting – – Single out certain individuals Single out certain individuals because of the items they possess because of the items they possess

  • Profiling

Profiling – – Identifying the items an Identifying the items an individual has in their possession individual has in their possession

slide-47
SLIDE 47

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 47 47

How far can a passive tag be read? How far can a passive tag be read?

( )

meters in distance MHz) (915 frequency meters/s 10 3 (meters) wavelength dBi) (1 gain antenna tag dBi) (6 gain antenna reader watt) (1 power nsmit reader tra needed) W (100 tag to available power 4

8 2 2 2

= = = = = = = = = = r f x c f c G G P P r G G P P

T R R T T R R T

λ µ π λ

Assume distance limited by power available to run the tag’s circuits.

slide-48
SLIDE 48

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 48 48

Maximum Distances to Read UHF Maximum Distances to Read UHF Passive Tag Passive Tag

54 54 16.5 16.5 15 15 38 38 11.7 11.7 12 12 27 27 8.3 8.3 9 9 19* 19* 5.8 5.8 6 (legal) 6 (legal) Distance Distance (feet) (feet) Distance Distance (meters) (meters) Antenna Gain Antenna Gain ( (dBi dBi) )

* Reality: Today, in the lab 8 to 12 feet.

slide-49
SLIDE 49

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 49 49

What is Privacy? What is Privacy?

  • Privacy includes the right to make

Privacy includes the right to make decisions about one decisions about one’ ’s own life, to keep s own life, to keep personal secrets, and to keep secrets personal secrets, and to keep secrets about where we come and go. about where we come and go.

  • It is the right to make decisions without

It is the right to make decisions without interference from the government or interference from the government or economic pressures from commercial economic pressures from commercial entities. entities.

slide-50
SLIDE 50

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 50 50

What Privacy is Not! What Privacy is Not!

  • Privacy does NOT apply to an

Privacy does NOT apply to an

  • rganization. It only applies to data about
  • rganization. It only applies to data about

an individual, which is called personally an individual, which is called personally identifiable data. identifiable data.

  • Privacy is NOT security.

Privacy is NOT security.

– – Security is important to privacy. Security is important to privacy. – – Security is only part of the story. Security is only part of the story.

slide-51
SLIDE 51

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 51 51

5 Principles of Privacy 5 Principles of Privacy

  • Notice
  • Notice. There must be no personal

. There must be no personal-

  • data, record

data, record-

  • keeping systems

keeping systems whose very existence is a secret. whose very existence is a secret.

  • Access
  • Access. There must be a way for a person to find out what

. There must be a way for a person to find out what information about the person is in a record and how it is used. information about the person is in a record and how it is used.

  • Choice
  • Choice. There must be a way to prevent personal information that

. There must be a way to prevent personal information that was obtained for one purpose from being used or made available f was obtained for one purpose from being used or made available for

  • r
  • ther purposes without the person
  • ther purposes without the person’

’s consent. s consent.

  • Recourse
  • Recourse. There must be a way for a person to correct or amend a

. There must be a way for a person to correct or amend a record of identifiable information about the person. record of identifiable information about the person.

  • Security
  • Security. Any organization creating, maintaining, using, or

. Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure disseminating records of identifiable personal data must assure the the reliability of the data for their intended use and must take reliability of the data for their intended use and must take reasonable precautions to prevent misuse of the data. reasonable precautions to prevent misuse of the data.

slide-52
SLIDE 52

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 52 52

Alan F. Westin Alan F. Westin’ ’s Privacy s Privacy Classifications Classifications

  • Privacy Fundamentalist (11% )

Privacy Fundamentalist (11% )

– – Very concerned Very concerned – – Unwilling to provide data Unwilling to provide data

  • Privacy Unconcerned (13% )

Privacy Unconcerned (13% )

– – Mild concern Mild concern – – Willing to provide data Willing to provide data

  • Privacy Pragmatists (75% )

Privacy Pragmatists (75% )

– – Somewhat concerned Somewhat concerned – – Willing to provide data if they are notified and get a Willing to provide data if they are notified and get a benefit benefit

slide-53
SLIDE 53

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 53 53

Future Work Future Work

  • Study and develop a systemic solution to

Study and develop a systemic solution to quantify and control privacy when quantify and control privacy when exchanging personally identifiable data. exchanging personally identifiable data.

  • This will create a more secure RFID

This will create a more secure RFID system that provides privacy assurance by system that provides privacy assurance by protecting the privacy of individuals. protecting the privacy of individuals.

slide-54
SLIDE 54

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 54 54

References References

  • N. Chaudhry, D. R. Thompson, and C. Thompson,
  • N. Chaudhry, D. R. Thompson, and C. Thompson, RFID Technical Tutorial and Threat Modeling

RFID Technical Tutorial and Threat Modeling, , ver

  • ver. 1.0, tech. report, Dept. of Computer Science and Computer Engi

. 1.0, tech. report, Dept. of Computer Science and Computer Engineering, University of neering, University of Arkansas, Fayetteville, Arkansas, Dec. 8, 2005. Available: http: Arkansas, Fayetteville, Arkansas, Dec. 8, 2005. Available: http:// // csce.uark.edu/~ drt/rfid csce.uark.edu/~ drt/rfid

  • S. Bono, M. Green, A. Stubblefield, A.
  • S. Bono, M. Green, A. Stubblefield, A. Juels

Juels, A. Rubin, and M. , A. Rubin, and M. Szydlo Szydlo, , “ “Security analysis of a Security analysis of a cryptographically cryptographically-

  • enabled RFID device,

enabled RFID device,” ” in in Proc.14th USENIX Security Symposium Proc.14th USENIX Security Symposium, Baltimore, , Baltimore, MD, USA, July MD, USA, July-

  • Aug. 2005, pp. 1
  • Aug. 2005, pp. 1-
  • 16.

16.

  • EPCglobal Inc., http://www.epcglobalinc.org/

EPCglobal Inc., http://www.epcglobalinc.org/

  • EPC Radio

EPC Radio-

  • Frequency Identity Protocols Class

Frequency Identity Protocols Class-

  • 1 Generation

1 Generation-

  • 2 UHF RFID Protocol for

2 UHF RFID Protocol for Communications at 860 MHz Communications at 860 MHz – – 960 MHz 960 MHz, , ver

  • ver. 1.0.9, EPCglobal Inc., Jan. 31, 2005. Available:

. 1.0.9, EPCglobal Inc., Jan. 31, 2005. Available: http://www.epcglobalinc.org/ http://www.epcglobalinc.org/ . .

  • K.
  • K. Finkenzeller

Finkenzeller, , RFID Handbook: Fundamentals and Applications in RFID Handbook: Fundamentals and Applications in Contactless Contactless Smart Cards and Smart Cards and Identification Identification, R. Waddington, Trans., , R. Waddington, Trans., 2nd ed 2nd ed. ., Hoboken, New Jersey: John Wiley & Sons, 2003. , Hoboken, New Jersey: John Wiley & Sons, 2003.

  • S.
  • S. Garfinkel

Garfinkel and B. Rosenberg, Eds., and B. Rosenberg, Eds., RFID: Applications, Security, and Privacy RFID: Applications, Security, and Privacy, Upper Saddle , Upper Saddle River, New Jersey: Addison River, New Jersey: Addison-

  • Wesley, 2006.

Wesley, 2006.

  • S.
  • S. Karthikeyan

Karthikeyan and M. and M. Nesterenko Nesterenko, , “ “RFID security without expensive cryptography, RFID security without expensive cryptography,” ” in in Proc. ACM

  • Proc. ACM

Workshop on Security of Ad Hoc and Sensor Networks (SASN) Workshop on Security of Ad Hoc and Sensor Networks (SASN), Alexandria, VA, USA, Nov. 2005, , Alexandria, VA, USA, Nov. 2005,

  • pp. 63
  • pp. 63-
  • 67.

67.

  • Opinion Research Corporation and Alan F. Westin.

Opinion Research Corporation and Alan F. Westin. "Freebies" and Privacy: What Net Users Think. "Freebies" and Privacy: What Net Users Think. Sponsored by Privacy & American Business. Hackensack, NJ: P & AB Sponsored by Privacy & American Business. Hackensack, NJ: P & AB, July 1999. Available: , July 1999. Available: http:// http:// www.privacyexchange.org www.privacyexchange.org

  • M. R.
  • M. R. Rieback

Rieback, B. , B. Crispo Crispo, and A. S. , and A. S. Tanenbaum Tanenbaum, , “ “Is your cat infected with a computer virus?, Is your cat infected with a computer virus?,” ” in in

  • Proc. IEEE Int
  • Proc. IEEE Int’

’l. Conf. Pervasive Computing and Communications (

  • l. Conf. Pervasive Computing and Communications (PerCom

PerCom) ), Pisa, Italy, Mar. 13 , Pisa, Italy, Mar. 13-

  • 17, 2006.

17, 2006.

  • Verichip

Verichip, , http:// http:// www.verichipcorp.com www.verichipcorp.com/ /

slide-55
SLIDE 55

http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 55 55

Contact Information Contact Information

Dale R. Thompson, P.E., Ph.D. Dale R. Thompson, P.E., Ph.D. Department of Computer Science and Computer Department of Computer Science and Computer Engineering Engineering University of Arkansas University of Arkansas 311 Engineering Hall 311 Engineering Hall Fayetteville, Arkansas 72701 Fayetteville, Arkansas 72701 Phone: + 1 (479) 575 Phone: + 1 (479) 575-

  • 5090

5090 FAX: + 1 (479) 575 FAX: + 1 (479) 575-

  • 5339

5339 E E-

  • mail:

mail: d.r.thompson@ieee.org d.r.thompson@ieee.org WWW: http:// WWW: http:// csce.uark.edu/~ drt csce.uark.edu/~ drt/ /