RFID Security - PowerPoint PPT Presentation

About This Presentation
Title:

RFID Security

Description:

Elimination of dock bottleneck: fast loading of palettes onto trucks. Inventory control (i.e., theft-prevention) Air Canada. tracking of food carts. Gillette ... – PowerPoint PPT presentation

Number of Views:48
Avg rating:3.0/5.0
Slides: 14
Provided by: nair6
Category:

less

Transcript and Presenter's Notes

Title: RFID Security


1
RFID Security
2
Current Applications
  • Logistics
  • Military supply logistics
  • Gulf War I Double orders to ensure arrival
  • Gulf War II RFID makes supply chain reliable
  • Proctor Gamble
  • Elimination of dock bottleneck fast loading of
    palettes onto trucks
  • Inventory control (i.e., theft-prevention)
  • Air Canada
  • tracking of food carts
  • Gillette
  • Tracking Mach3 razor blades
  • Ordered 3 million
  • Refining the retail experience
  • Payment technologies
  • Exxon/Mobil
  • Speedpass

3
Future Applications
  • Maintaining shelf stocks in retail environments
  • Tagging pets
  • Proximity badges for building access
  • Clothing anti-forgery, customer returns
  • Parenting logistics
  • Water park uses RFID bracelets to track children
  • Smart appliances
  • Refrigerators that automatically create shopping
    lists
  • Ovens that know how to cook pre-packaged food
  • Smart products
  • Clothing, appliances, CDs tagged for store
    returns
  • Smart paper
  • Airline tickets that indicate your location in
    the airport
  • Library books
  • Business cards
  • Recycling
  • Plastics that sort themselves

4
RFID Viability
  • Expensive tags were OK for high tickets
  • Price has to go below 0.05
  • A recent purchase involved 500 million tags
    purchased by retialer
  • Once viable (as predicted) RFID could be the most
    widely deployed chip
  • Promise is to replace the 5 billion barcode
    scans/day

5
Basic Components
  • RFID Tag
  • Transponder
  • Located on the object to be identified
  • RFID Reader
  • Transceiver
  • Can read and write data to Tag
  • Data Processing Subsystem
  • Connects to reader

6
Security Issues
  • Privacy
  • Business
  • Personal
  • Denial of service
  • Incorrect information
  • Forgeries

7
Cost-Security Trade-off
  • Low cost
  • Low intelligence (up to 5000 gates)
  • Low storage (few hundred bits)
  • Low range (few meters)
  • Security
  • AES needs 20-30 thousand gates
  • Hash such as SHA-1 also needs similar order
  • TEA algorithm still not feasible

8
Forward and Backward Channels
9
Hash-Based Access Control
10
Randomized Access Control
11
Anti-Collision Algorithms
  • Probabilistic
  • Tags respond in randomly generate times
  • Slotted Aloha scheme
  • Deterministic - Binary tree-walking scheme
  • Space of k-bit identifiers
  • k-bit identifiers leaves in a tree of depth k
  • Reader sorts through tags based on tag-ID
  • Traverses tree asking subsets of tags to
    broadcast a single bit at a time.
  • RFID reader broadcasts tag serial numbers over
    very large distances
  • May introduce vulnerability to eavesdropping.

12
Silent Tree Walking
13
Other Measures
  • Proactive detection of intruders
  • Chaffing and Winnowing
  • Confidentiality without encryption
  • Deliberate DoS for privacy
Write a Comment
User Comments (0)
About PowerShow.com