Title: Calling All Things
1Calling All Things
- RFID technology,
- its impact and our challenges
2Contents
- How it works (Hardware)
- What it can do (Applications)
- How it affects us (Societal issues)
- How to control it (Countermeasures)
3I
How it works
4A typical RFID system
- Transponder/tag
- active / passive
- 1 bit 64 kB (EEPROM/SRAM)
- controller / CPU
- read-only / read-write
- Backoffice
- Databases
- Datamining
- Reader
- LF / UHF
- Communication range
- Coupling
5RFID tags
6RFID readers
7Primary classifiers
- Active / passive
- LF / HF / UHF / micro
- Read-only / read-write
- State-machine / CPU
- n-bit / 1-bit
8Reading distance (1)
- Design range
- Close-coupling (0 1 cm)
- Proximity coupling (7 15 cm)
- Vicinity/Remote-coupling (0 1 m)
- Long range (gt 1m)
- Eavesdropping range
- Maximum reading range
9Reading distance (2)
Limited by power consumption of controller/CPU
on tag
Longer for active tags
10Communication
Tag-to- reader eavesdropping hard
- Principle (load modulation)
- Collision avoidance
- Prefixes of ID
11II
What it can do
12- We now face the imminent expansion
- of cyberspace into physical space
- in the form of
- networked cameras,
- biometric identification devices,
- RFID tags on consumer goods,
- and a wide variety of sensors.
13Applications
Mind that tree, Richard!
- Health care
- Emergency services
- Blindness (The object in front is a )
- Obsessive Compulsive Disorder (OCD )
- Access control
- Who is inside? Emergency information
- Logistics / Supply chain
- WalMart
- Shopping
- METRO store
- PRADA
14Applications
- Travel/traffic
- Passport
-
- Hypertag (advertisement)
- Tag on object user (gsm) reads
- Exploratorium, San Fransisco
- Reader at object user wears tag
15Example What-is-this
- With RFID
- Not only immovables (GPS)
- Including billboards
- RFID (UphID) ? URL
- Conditional access
- Sowing seeds vs 1 UphID for all
- 1 RFID n UphID
16Smart Dust
17III
How it affects us
18In a mediated environment where everything is
connected to everything - it is no longer clear
what is being mediated, and what mediates.
19Current RFID systems unsafe
- No authentication
- No friend/foe distinction
- No access control
- Rogue reader can link to tag
- Rogue tag can mess up reader
- No encryption
- Eavesdropping possible (esp. reader)
- Predictable responses
- Traffic analysis, linkability
- No GUI
- and distance not enforced by tag
20RFID Risks Consumers
- User profiling
- Possible robbery target
- Possible street-marketing target
- Personalised loyalty/discounts
- Refuse/grant access to shop/building
- Even for tags without serial no
- Loss of location privacy
- By tracking same user profile
- Fake transactions / Identity theft
21RFID Risks Companies
- Corporate espionage
- Scanning competitors inventory (or customer base)
- Eavesdropping tags
- Querying tags
- Unauthorised access
- Fake RFIDs
- Derived/competing services
- Using competitors installed base
- Denial of service attacks
- Supply chain failure
- Jamming signals
- Fake RFIDs
22Aggregate data
time space
- Maybe too big to analyse/datamine.
- . but easily searched for 1 person
23IV
How to control it
24First ideas
- Kill command
- Blocker tag
- Metal shielding
- Many tags
25Random identifier
h
identifier
g
to reader
26Tracing banknotes (1)
- Primary issues
- Prevent tracing
- Prevent purse scanning
- Prevent counterfeiting
- Trace money laundering
27Tracing banknotes (2)
28Biometric passport (1)
- Primary issues
- Prevent tracing
- Prevent skimming
- Especially biometric data
- Prevent counterfeiting
29Biometric passport (2)
30http//www.cs.ru.nl/pearl
jhh_at_cs.ru.nl
31Resources
- Klaus Finkenzeller RFID-Handbook, 2nd (3rd) ed,
Wiley Sons, ISBN 0-470-84402-7
http//www.rfid-handbook.de/