http://csce.uark.edu/~drt/rfid1 rfid technical tutorial presented by: dale r. thompson dept. of...

55
http://csce.uark.edu/~drt/rfi http://csce.uark.edu/~drt/rfi d 1 RFID Technical RFID Technical Tutorial Tutorial Presented by: Dale R. Thompson Presented by: Dale R. Thompson Dept. of Computer Science and Computer Dept. of Computer Science and Computer Engineering Engineering University of Arkansas University of Arkansas

Post on 22-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 11

RFID Technical RFID Technical TutorialTutorial

Presented by: Dale R. ThompsonPresented by: Dale R. ThompsonDept. of Computer Science and Computer Dept. of Computer Science and Computer

EngineeringEngineeringUniversity of ArkansasUniversity of Arkansas

Page 2: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 22

GoalsGoals

Understand the details of RFID with Understand the details of RFID with focus on EPCglobal UHF Class-1 focus on EPCglobal UHF Class-1 Generation-2 (Gen-2) passive tags Generation-2 (Gen-2) passive tags being introduced into retail.being introduced into retail.

Introduce the security threats Introduce the security threats toto RFID RFID and the privacy threats and the privacy threats byby RFID. RFID.

Convince you that Privacy Assurance Convince you that Privacy Assurance is necessary.is necessary.

Page 3: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 33

University of Arkansas RFID University of Arkansas RFID Research CenterResearch Center

Fully student staffed with 24 industry members, which recently Fully student staffed with 24 industry members, which recently became the first open laboratory to be accredited by EPCglobal became the first open laboratory to be accredited by EPCglobal Inc.Inc.

Page 4: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 44

What is RFID?What is RFID?

Stands for Radio Frequency Stands for Radio Frequency IdentificationIdentification

Uses radio waves for identificationUses radio waves for identification New frontier in the field of information New frontier in the field of information

technology technology One form of Automatic IdentificationOne form of Automatic Identification Provides unique identification or serial Provides unique identification or serial

number of an object (pallets, cases, number of an object (pallets, cases, items, animals, humans)items, animals, humans)

Page 5: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 55

ApplicationsApplications

Mobil Speedpass systemsMobil Speedpass systems Automobile Immobilizer Automobile Immobilizer

systemssystems Fast-lane and E-Zpass Fast-lane and E-Zpass

road toll systemroad toll system Secure Entry cardsSecure Entry cards Animal IdentificationAnimal Identification HumansHumans Supply chain managementSupply chain management

Page 6: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 66

RFID SystemRFID System

Page 7: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 77

RFID ReaderRFID Reader Also known an interrogatorAlso known an interrogator Reader powers passive tags with RF energyReader powers passive tags with RF energy Can be handheld or stationaryCan be handheld or stationary Consists of:Consists of:

– TransceiverTransceiver– AntennaAntenna– MicroprocessorMicroprocessor– Network interfaceNetwork interface

Page 8: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 88

RFID Frequency rangeRFID Frequency range

Frequency BandFrequency Band DescriptionDescription

< 135 KHz< 135 KHz Low frequencyLow frequency

6.765 – 6.795 MHz6.765 – 6.795 MHz HFHF

7.4 – 8.8 MHz7.4 – 8.8 MHz HFHF

13.553 – 13.567 MHz13.553 – 13.567 MHz HFHF

26.957 – 27. 283 MHz26.957 – 27. 283 MHz HFHF

433 MHz433 MHz UHFUHF

868 – 870 MHz868 – 870 MHz UHFUHF

902 – 928 MHz902 – 928 MHz UHFUHF

2.4 – 2.483 GHz2.4 – 2.483 GHz SHFSHF

5.725 – 5.875 GHz5.725 – 5.875 GHz SHFSHF

Page 9: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 99

FCC Rules for ISM Band FCC Rules for ISM Band Wireless EquipmentWireless Equipment

Federal Communications Commission Federal Communications Commission (FCC) regulates frequencies in United (FCC) regulates frequencies in United StatesStates

FCC regulations appear in title 47 of FCC regulations appear in title 47 of the United States Code of Federal the United States Code of Federal Regulations (47CFR) and radio Regulations (47CFR) and radio spectrum issues are the subject of spectrum issues are the subject of part 15 of the FCC rulespart 15 of the FCC rules

Industrial, Scientific and Medical (ISM) Industrial, Scientific and Medical (ISM) devicesdevices

Page 10: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 1010

FCC Rules for 902-928 MHzFCC Rules for 902-928 MHz Maximum transmitter power limited to 1 Maximum transmitter power limited to 1

watt for systems that frequency hop across watt for systems that frequency hop across at least 50 channels (Gen-2 readers typically at least 50 channels (Gen-2 readers typically run 1 watt and frequency hop across 50 run 1 watt and frequency hop across 50 channels)channels)

Maximum EIRP (effective isotropic radiated Maximum EIRP (effective isotropic radiated power) is limited to 4 watts (36 dBm). For power) is limited to 4 watts (36 dBm). For antenna gain greater than 6 dBi must reduce antenna gain greater than 6 dBi must reduce power. (For 1 watt reader transmitter the power. (For 1 watt reader transmitter the maximum gain antenna can be up to 6 dBI.)maximum gain antenna can be up to 6 dBI.)

When frequency hopping, the transmitter When frequency hopping, the transmitter must not use one frequency greater than must not use one frequency greater than 0.40 seconds within a 20 second period0.40 seconds within a 20 second period

Page 11: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 1111

RFID TagRFID Tag

Tag is a device used to transmit Tag is a device used to transmit information such as a serial number information such as a serial number to the reader in a contact less to the reader in a contact less mannermanner

Classified as :Classified as :– Passive – energy from readerPassive – energy from reader– Active - batteryActive - battery– Semi-passive – battery and energy from Semi-passive – battery and energy from

readerreader

Page 12: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 1212

PrintersPrinters

Page 13: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 1313

MiddlewareMiddleware

Each reader manufacturerEach reader manufacturer Commercial middlewareCommercial middleware Open source middleware work at Open source middleware work at

UofAUofA

Page 14: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 1414

DatabaseDatabase

Store attributes related to the serial Store attributes related to the serial number of the RFID tagnumber of the RFID tag

ExamplesExamples– What is it?What is it?– Who made it?Who made it?– Who bought it?Who bought it?– Where has it been?Where has it been?

Page 15: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 1515

Contactless Smart CardsContactless Smart Cards ISO 7618 - A set of international standards ISO 7618 - A set of international standards

covering the basic characteristics of contactless covering the basic characteristics of contactless smart cards, such as physical and electrical smart cards, such as physical and electrical characteristics, communication protocols and characteristics, communication protocols and others.others.

Proximity Smart Cards (13.56 MHz)Proximity Smart Cards (13.56 MHz)– Range = 4 inches (10 centimeter)Range = 4 inches (10 centimeter)– Baud rate = 106 kilobaudBaud rate = 106 kilobaud– ISO/IEC 14443ISO/IEC 14443

Vicinity Smart Cards (13.56 MHz)Vicinity Smart Cards (13.56 MHz)– Range = 3 feet (1 meter)Range = 3 feet (1 meter)– Baud rate = 26.48 kilobaudBaud rate = 26.48 kilobaud– ISO/IEC 15693ISO/IEC 15693

Page 16: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 1616

Animal Identification Animal Identification StandardsStandards

International standard 134.2 kHzInternational standard 134.2 kHz– ISO 11784: “Radio-frequency identification of ISO 11784: “Radio-frequency identification of

animals” – code structureanimals” – code structure– ISO 11785: “Radio-frequency identification of ISO 11785: “Radio-frequency identification of

animals” – Technical conceptanimals” – Technical concept– ISO 14223: “Radio-frequency identification of ISO 14223: “Radio-frequency identification of

animals” – Advanced transpondersanimals” – Advanced transponders U.S. standard 125 kHzU.S. standard 125 kHz At these frequencies the RF can penetrate At these frequencies the RF can penetrate

mud, blood, and watermud, blood, and water

Page 17: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 1717

VeriChipVeriChip Human implantable RFID tag operating at about 134 KHz Human implantable RFID tag operating at about 134 KHz

because at these frequencies the RF can penetrate mud, because at these frequencies the RF can penetrate mud, blood, and waterblood, and water

About the size of uncooked grain of riceAbout the size of uncooked grain of rice Oct. 22, 2002 – US Food and Drug Administration ruled Oct. 22, 2002 – US Food and Drug Administration ruled

VeriChip not regulated deviceVeriChip not regulated device Oct. 2004 – FDA ruled serial number in VeriChip could be Oct. 2004 – FDA ruled serial number in VeriChip could be

linked to healthcare informationlinked to healthcare information Healthcare applicationsHealthcare applications

– Implanted medical device identificationImplanted medical device identification– Emergency access to patient-supplied health informationEmergency access to patient-supplied health information– Portable medical records access including insurance Portable medical records access including insurance

informationinformation– In-hospital patient identificationIn-hospital patient identification– Medical facility connectivity via patientMedical facility connectivity via patient– Disease/treatment management of at-risk populations (such as Disease/treatment management of at-risk populations (such as

vaccination history)vaccination history)

Page 18: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 1818

Supply Chain ManagementSupply Chain Management RFID adds visibility as the items flow through the RFID adds visibility as the items flow through the

supply chain from the manufacturer, shippers, supply chain from the manufacturer, shippers, distributors, and retailers.distributors, and retailers.

The added visibility can identify bottlenecks and The added visibility can identify bottlenecks and save money.save money.

Wal-Mart requested in June 2003 that their top 100 Wal-Mart requested in June 2003 that their top 100 suppliers use RFID at the pallet and case level by suppliers use RFID at the pallet and case level by January 2005.January 2005.

Wal-Mart currently has 300 suppliers sending Wal-Mart currently has 300 suppliers sending products to 500 RFID-enabled Wal-Mart and Sam's products to 500 RFID-enabled Wal-Mart and Sam's Club stores.*Club stores.*

Wal-Mart wants 1,000 stores with RFID by January Wal-Mart wants 1,000 stores with RFID by January 2007.*2007.*

*Source: http://www.extremerfid.com/article/WalMart+Forges+Ahead+with+RFID/172888_1.aspx*Source: http://www.extremerfid.com/article/WalMart+Forges+Ahead+with+RFID/172888_1.aspx

Page 19: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 1919

Does RFID Reduce Out of Does RFID Reduce Out of Stocks? A Preliminary Analysis Stocks? A Preliminary Analysis

Study by UA RFID Research CenterStudy by UA RFID Research Center Authors: Bill C. Hardgrave, Matthew Waller, Authors: Bill C. Hardgrave, Matthew Waller,

Robert Miller, University of ArkansasRobert Miller, University of Arkansas From February 14 to September 12, 2005, out of From February 14 to September 12, 2005, out of

stocks were examined daily in 24 Wal-Mart stores stocks were examined daily in 24 Wal-Mart stores (12 RFID-enabled stores, 12 control stores) (12 RFID-enabled stores, 12 control stores)

RFID reduced out-of-stocks by approximately 16% RFID reduced out-of-stocks by approximately 16% because RFID was able to identify if items were in because RFID was able to identify if items were in the back roomthe back room

http://itri.uark.edu/research/display.asp?http://itri.uark.edu/research/display.asp?article=ITRI-WP058-1105 article=ITRI-WP058-1105

Page 20: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 2020

Standardization Item Standardization Item ManagementManagement

ISO/IEC [International Standards Organization (ISO), www.iso.org] ISO/IEC [International Standards Organization (ISO), www.iso.org] and International Electrotechnical Commission, www.iec.ch ]and International Electrotechnical Commission, www.iec.ch ]– 18000–1: Generic air interfaces for globally accepted frequencies 18000–1: Generic air interfaces for globally accepted frequencies – 18000–2: Air interface for 135 KHz 18000–2: Air interface for 135 KHz – 18000–3: Air interface for 13.56 MHz18000–3: Air interface for 13.56 MHz– 18000–4: Air interface for 2.45 GHz18000–4: Air interface for 2.45 GHz– 18000–5: Air interface for 5.8 GHz18000–5: Air interface for 5.8 GHz– 18000–6: Air interface for 860 MHz to 930 MHz18000–6: Air interface for 860 MHz to 930 MHz– 18000–7: Air interface at 433.92 MHz 18000–7: Air interface at 433.92 MHz

EPCglobal Inc., www.epcglobalinc.com EPCglobal Inc., www.epcglobalinc.com – HF (13.56 MHz)HF (13.56 MHz)

13.56 MHz ISM Band Class 113.56 MHz ISM Band Class 1– UHF (868 – 928 MHz)UHF (868 – 928 MHz)

UHF Class-0UHF Class-0 UHF Class-1 Generation-1 (Class-1 Gen-1)UHF Class-1 Generation-1 (Class-1 Gen-1) UHF Class-1 Generation-2 (Class-1 Gen-2)UHF Class-1 Generation-2 (Class-1 Gen-2)

– Moving toward ISO 18000-6CMoving toward ISO 18000-6C

Page 21: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 2121

EPCglobal, Inc.EPCglobal, Inc. Not-for-profit organization developing Not-for-profit organization developing

commercial, world-wide RFID standardscommercial, world-wide RFID standards Joint venture between EAN International Joint venture between EAN International

and the Uniform Code Council (UCC).and the Uniform Code Council (UCC).– UCC standardized Universal Product Code UCC standardized Universal Product Code

(UPC) barcodes in US(UPC) barcodes in US– EAN standardized barcodes in EuropeEAN standardized barcodes in Europe– UCC and EAN combined to form GS1UCC and EAN combined to form GS1

http://www.epcglobalinc.org/http://www.epcglobalinc.org/ UHF Class-1 Generation-2 (Class-1 Gen-2 UHF Class-1 Generation-2 (Class-1 Gen-2

or commonly known as Gen-2)or commonly known as Gen-2)– In process of becoming ISO 18000-6C standardIn process of becoming ISO 18000-6C standard

Page 22: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 2222

Electronic Product Code Electronic Product Code (EPC)(EPC)

96 bits can uniquely label all products for the next 1,000 years

Page 23: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 2323

EPC vs. EPC vs. UPC (Barcodes)UPC (Barcodes)

Both are forms of Automatic identification Both are forms of Automatic identification technologiestechnologies

Universal Product Code (UPC) require line of Universal Product Code (UPC) require line of sight and manual scanning whereas EPC do sight and manual scanning whereas EPC do notnot

UPC require optical reader to read whereas UPC require optical reader to read whereas EPC reader reads via radio wavesEPC reader reads via radio waves

EPC tags possess a memory and can be EPC tags possess a memory and can be written while UPC do notwritten while UPC do not

EPC tags cost 5 cents, UPC tags cost 1/10 centEPC tags cost 5 cents, UPC tags cost 1/10 cent

Page 24: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 2424

EPCglobal Inc. UHF EPCglobal Inc. UHF Specification HistorySpecification History

EPCglobal UHF Class-0EPCglobal UHF Class-0 EPCglobal UHF Class-1 Generation-1EPCglobal UHF Class-1 Generation-1 EPCglobal UHF Class-1 Gen-2 (Gen-2)EPCglobal UHF Class-1 Gen-2 (Gen-2)

– In process of becoming ISO 18000-6C In process of becoming ISO 18000-6C standardstandard

– Item management standardItem management standard– Retail standardRetail standard

Page 25: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 2525

EPCglobal UHF Class-1 Gen-2 Reader-EPCglobal UHF Class-1 Gen-2 Reader-to-Tag Physical and Link Layersto-Tag Physical and Link Layers

ModulationModulation– Double sideband amplitude shift keying (DSB-ASK) Double sideband amplitude shift keying (DSB-ASK) – Single-sideband ASK (SSB-ASK)Single-sideband ASK (SSB-ASK)– Phase reversal ASK (PR-ASK)Phase reversal ASK (PR-ASK)

Encoding - Pulse interval encoding (PIE)Encoding - Pulse interval encoding (PIE) Data rate based on TariData rate based on Tari

– Tari 25 microsecond (TYPICAL SETTING) Tari 25 microsecond (TYPICAL SETTING) 40 Kilobits per second (Kbps) maximum40 Kilobits per second (Kbps) maximum 27 Kbps average27 Kbps average

– Tari 12.5 microsecondTari 12.5 microsecond 80 Kbps maximum80 Kbps maximum 53 Kbps average53 Kbps average

– Tari 6.25 microsecondTari 6.25 microsecond 160 Kbps maximum160 Kbps maximum 107 Kbps average107 Kbps average

Page 26: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 2626

PIE EncodingPIE Encoding

Page 27: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 2727

EPCglobal UHF Class-1 Gen-2 Tag-to-EPCglobal UHF Class-1 Gen-2 Tag-to-Reader Physical and Link LayersReader Physical and Link Layers

Backscatter modulation Backscatter modulation – Varies reflection coefficient of antennaVaries reflection coefficient of antenna– Switch load on antenna in time with bits, which varies input Switch load on antenna in time with bits, which varies input

impedanceimpedance– Varies amount of energy reflected from tag to readerVaries amount of energy reflected from tag to reader– 80 to 90 dB less signal than reader-to-tag (10,000 times weaker!)80 to 90 dB less signal than reader-to-tag (10,000 times weaker!)

ModulationModulation– Amplitude shift keying (ASK) Amplitude shift keying (ASK) – Phase shift keying (PSK)Phase shift keying (PSK)

Encoding – Reader chooses typeEncoding – Reader chooses type– FM0FM0– Miller (M=2, 4, or 8)Miller (M=2, 4, or 8)

Data rates are variableData rates are variable– FM0 [single reader mode] – 40 Kbps up to 640 KbpsFM0 [single reader mode] – 40 Kbps up to 640 Kbps– Miller (M=2) [multi-reader mode] – 20 Kbps up to 320 KbpsMiller (M=2) [multi-reader mode] – 20 Kbps up to 320 Kbps– Miller (M=4) [dense reader mode] – 10 Kbps up to 160 KbpsMiller (M=4) [dense reader mode] – 10 Kbps up to 160 Kbps– Miller (M=8) – 5 Kbps up to 80 KbpsMiller (M=8) – 5 Kbps up to 80 Kbps– Typical rates in the lab vary between 60-70 Kbps using Miller (M=4)Typical rates in the lab vary between 60-70 Kbps using Miller (M=4)

Page 28: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 2828

Class-1 Gen-2 Anti-Collision Class-1 Gen-2 Anti-Collision Protocol (media access control)Protocol (media access control) Select phaseSelect phase

– Single out particular tag population with one or more bits with query tree Single out particular tag population with one or more bits with query tree protocolprotocol

Inventory phase – identify individual tag using Q protocol (slotted-Inventory phase – identify individual tag using Q protocol (slotted-aloha based)aloha based)– Reader sends Query with parameter Q and Session number (Q=4 is Reader sends Query with parameter Q and Session number (Q=4 is

suggested default)suggested default)– Reader creates slotted timeReader creates slotted time– Tags pick random 16-bit number for Tags pick random 16-bit number for handlehandle– Tags in requested session pick a random number in the range [0,2^Q-1] Tags in requested session pick a random number in the range [0,2^Q-1]

for for slot_numberslot_number– If If slot_numberslot_number = 0, backscatter = 0, backscatter handlehandle– If If slot_numberslot_number != 0, wait that number of slots to backscatter != 0, wait that number of slots to backscatter handlehandle– Reader ACKs individual tag with Reader ACKs individual tag with handlehandle and goes to access phase. All and goes to access phase. All

other tags wait.other tags wait.– If more that one tag answers, reader can send same Q again or send If more that one tag answers, reader can send same Q again or send

modified Qmodified Q Access phaseAccess phase

– Reader interacts with tags requesting EPC number and any other Reader interacts with tags requesting EPC number and any other informationinformation

Page 29: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 2929

Class-1 Gen-2 Select (Query Class-1 Gen-2 Select (Query Tree)Tree)

Time slice 0 1 2 3 4 5

Reader-to-Tag 0**   00*   01*  

Tag-to-Reader 

collision

  no answer  collisio

n

Tag1 (ID = 010)   010       010

Tag2 (ID = 011)   011       011

Tag3 (ID = 100)            Time slice 6 7 8 9 10 11

Reader-to-Tag 010   011   1**  

Tag-to-Reader   010   011   100

Tag1 (ID = 010)   010        

Tag2 (ID = 011)       011    

Tag3 (ID = 100)           100

Page 30: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 3030

Class-1 Gen-2 Select (Query Class-1 Gen-2 Select (Query Tree)Tree)

Page 31: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 3131

Class-1 Gen-2 Inventory Class-1 Gen-2 Inventory (Q protocol, form of slotted (Q protocol, form of slotted

Aloha)Aloha)Time slice 0 1 2 3 4 5 6 7

Slot number     0 1 2 3    

Reader-to-Tag Query Q=2           ACK handle1  

Tag-to-Reader     handle1 collision empty empty   EPC1

Tag1   slot=0 handle1         EPC1

Tag2   slot=1   handle2        

Tag3   slot=1   handle3        

Time slice 8 9 10 11 12 13 14 15

Slot number     0 1 2 3    

Reader-to-TagQueryAdjus

t          ACK handle2  

Tag-to-Reader     empty handle2 empty handle3   EPC2

Tag1 (ID = 010)   wait            

Tag2 (ID = 011)   slot=1   handle2       EPC2

Tag3 (ID = 100)   slot=3       handle3    

Page 32: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 3232

Class-1 Gen-2 SecurityClass-1 Gen-2 Security

Ability to generate 16-bit pseudo-Ability to generate 16-bit pseudo-random numberrandom number– Handle for singulation (better than using Handle for singulation (better than using

EPC)EPC)– Encrypt (obscure) reader-to-tag linkEncrypt (obscure) reader-to-tag link– Pick slots in Q protocolPick slots in Q protocol

16-bit CRC for error detection16-bit CRC for error detection 32-bit access password32-bit access password 32-bit kill password32-bit kill password

Page 33: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 3333

Trivia on Passive UHF RFID Trivia on Passive UHF RFID

How far can a reader read a tag?How far can a reader read a tag?– Less than 20 feet using legal equipmentLess than 20 feet using legal equipment

What causes interference at these What causes interference at these frequencies?frequencies?– Metal reflects the energy and can shieldMetal reflects the energy and can shield– Water absorbs the energy. Microwaves Water absorbs the energy. Microwaves

operate at 2.4 GHz because water operate at 2.4 GHz because water absorbs energy at these frequencies. absorbs energy at these frequencies. Passive UHF operates around 900 MHz, Passive UHF operates around 900 MHz, which is close enough.which is close enough.

Page 34: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 3434

Hacking Cryptographically-Hacking Cryptographically-Enabled RFID DeviceEnabled RFID Device

Team at Johns Hopkins University Team at Johns Hopkins University reverse engineer Texas Instrument’s reverse engineer Texas Instrument’s Digital Signature TransponderDigital Signature Transponder– Paid for gas with cloned RFID tagPaid for gas with cloned RFID tag– Started car with cloned RFID tagStarted car with cloned RFID tag

LessonsLessons– Security by obscurity does not workSecurity by obscurity does not work– Use standard cryptographic algorithms Use standard cryptographic algorithms

with sufficient key lengthswith sufficient key lengths

Page 35: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 3535

RFID-enabled PassportRFID-enabled Passport May 2002: The Enhanced Border Security and Visa Entry Reform Act requires May 2002: The Enhanced Border Security and Visa Entry Reform Act requires

the USA and other countries whose citizens don't need visas for entering the the USA and other countries whose citizens don't need visas for entering the USA to develop electronic passports. The act sets a deadline of October 2004.USA to develop electronic passports. The act sets a deadline of October 2004.

March 2004: The Bush administration asks Congress to delay the deadline to March 2004: The Bush administration asks Congress to delay the deadline to October 2006 to allow participating countries more time to address technical October 2006 to allow participating countries more time to address technical issues. Congress agrees.issues. Congress agrees.

January 2005 - US Government Awards RFID Passport Contracts for testing January 2005 - US Government Awards RFID Passport Contracts for testing RFID passportsRFID passports

April 2005: The State Department closes comment period, begins to firm up April 2005: The State Department closes comment period, begins to firm up plans for the new e-passport.plans for the new e-passport.

April 2005 – State Department reconsiders adding security measures April 2005 – State Department reconsiders adding security measures to RFID-enabled passports after public outcry because can be read at to RFID-enabled passports after public outcry because can be read at 30 feet (10 meters) instead of 4 inches (10 cm) [ISO 14443]30 feet (10 meters) instead of 4 inches (10 cm) [ISO 14443]

August 2005 – State Department adds metallic ant-skimming material to August 2005 – State Department adds metallic ant-skimming material to cover and spine of passport to limit reading distance to 1 inchcover and spine of passport to limit reading distance to 1 inch

November 2005: State Department plans to make e-passports available to November 2005: State Department plans to make e-passports available to U.S. travelers by October 2006 that have features to prevent skimming and U.S. travelers by October 2006 that have features to prevent skimming and Basic Access Control (characters printed on passport act like PIN number)Basic Access Control (characters printed on passport act like PIN number)– Before being read PIN must be entered into readerBefore being read PIN must be entered into reader– Encryption between reader and tagEncryption between reader and tag

October 2005: E-passports available for U.S. travelersOctober 2005: E-passports available for U.S. travelers

Page 36: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 3636

RFID-enabled passportRFID-enabled passport

Metallic anti-skimming material Metallic anti-skimming material added in cover and spine to reduce added in cover and spine to reduce read distance to 1 inchread distance to 1 inch

PIN number printed on cover must be PIN number printed on cover must be entered in reader to read tag and it entered in reader to read tag and it encrypts communicationencrypts communication

New industry for wallet makers New industry for wallet makers creating Faraday cages for passportscreating Faraday cages for passports

Page 37: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 3737

Passport Solution!Passport Solution!

Page 38: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 3838

RFDumpRFDump

Open source software tool for RFID Open source software tool for RFID ISO-15693 and ISO-14443 readers ISO-15693 and ISO-14443 readers (13.56 MHz)(13.56 MHz)– Read/write data on RFID tagsRead/write data on RFID tags– Integrated cookie featureIntegrated cookie feature

Add cookie to tag and automatically Add cookie to tag and automatically increment counter when tag is in range of increment counter when tag is in range of readerreader

Track number of times shopper enters Track number of times shopper enters reader field or picks up itemreader field or picks up item

– www.rf-dump.orgwww.rf-dump.org

Page 39: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 3939

RFID VirusRFID Virus

M. R. Rieback, B. Crispo, and A. S. M. R. Rieback, B. Crispo, and A. S. Tanenbaum, “Is your cat infected Tanenbaum, “Is your cat infected with a computer virus?,” in with a computer virus?,” in Proc. IEEE Proc. IEEE Int’l. Conf. Pervasive Computing and Int’l. Conf. Pervasive Computing and Communications (PerCom)Communications (PerCom), Pisa, , Pisa, Italy, Mar. 13-17, 2006.Italy, Mar. 13-17, 2006.

More to do with attack against RFID More to do with attack against RFID middleware software than RFIDmiddleware software than RFID– SQL injection attackSQL injection attack– Buffer overflow attackBuffer overflow attack

Page 40: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 4040

RFID Security and Privacy RFID Security and Privacy ThreatsThreats

Security threats Security threats toto the RFID system the RFID system Privacy threats Privacy threats byby the RFID system the RFID system

Page 41: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 4141

Threat ModelingThreat Modeling

Assemble teamAssemble team Decompose system into threat Decompose system into threat

targetstargets Identify/Categorize threats to threat Identify/Categorize threats to threat

targetstargets Attack graphs for each threat targetAttack graphs for each threat target Assign risk to each threatAssign risk to each threat Sort threatsSort threats Mitigate threats with higher risksMitigate threats with higher risks

Page 42: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 4242

Security Threats Categorized Security Threats Categorized with STRIDEwith STRIDE

SSpoofing identitypoofing identity TTampering with dataampering with data RRepudiationepudiation IInformation disclosurenformation disclosure DDenial of serviceenial of service EElevation of privilegelevation of privilege

Page 43: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 4343

STRIDE Categories and Mitigation STRIDE Categories and Mitigation TechniquesTechniques

Category Techniques

Spoofing identity Appropriate authenticationProtect secretsDon’t store secrets

Tampering with data Appropriate authenticationHashesMessage authentication codesDigital signaturesTamper-resistant protocols

Repudiation Digital signaturesTimestampsAudit trails

Information disclosure AuthorizationPrivacy-enhanced protocolsEncryptionProtect secretsDon’t store secrets

Denial of service Appropriate authenticationAppropriate authorizationFilteringThrottlingQuality of Service

Elevation of privilege Run with least privilege

Page 44: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 4444

Security Threats Security Threats toto RFID RFID A competitor or thief performs an unauthorized A competitor or thief performs an unauthorized

inventory of a store by scanning tags with an inventory of a store by scanning tags with an unauthorized reader to determine the types and unauthorized reader to determine the types and quantities of items.quantities of items.– SpoofingSpoofing– Information disclosureInformation disclosure

An attacker modifies the EPC number on tags or kills An attacker modifies the EPC number on tags or kills tags in the supply chain, warehouse, or store tags in the supply chain, warehouse, or store disrupting business operations and causing a loss of disrupting business operations and causing a loss of revenue.revenue.– Tampering with dataTampering with data– Denial of serviceDenial of service

An attacker modifies a high-priced item’s EPC An attacker modifies a high-priced item’s EPC number to be the EPC number of a lower cost item.number to be the EPC number of a lower cost item.– Tampering with dataTampering with data

Page 45: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 4545

Privacy Threats Privacy Threats byby RFID RFID A bomb in a restaurant explodes when there are five or A bomb in a restaurant explodes when there are five or

more Americans with RFID-enabled passports detected.more Americans with RFID-enabled passports detected. A mugger marks a potential victim by querying the tags in A mugger marks a potential victim by querying the tags in

possession of an individual.possession of an individual. A fixed reader at any retail counter could identify the tags A fixed reader at any retail counter could identify the tags

of a person and show the similar products on the nearby of a person and show the similar products on the nearby screen to a person to provide individualized marketing.screen to a person to provide individualized marketing.

A sufficiently powerful directed reader reads tags in your A sufficiently powerful directed reader reads tags in your house or car.house or car.– The ISO 14443 standard proposed for passports specifies about The ISO 14443 standard proposed for passports specifies about

4 inches (10 cm) as the typical range. However, NIST with a 4 inches (10 cm) as the typical range. However, NIST with a special purpose antenna read it at 30 feet (10 meters)!special purpose antenna read it at 30 feet (10 meters)!

RFID enables tracking, profiling, and RFID enables tracking, profiling, and surveillance of individuals on a large surveillance of individuals on a large scale.scale.

Page 46: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 4646

Top Privacy Threats by RFIDTop Privacy Threats by RFID

Tracking – Determine where Tracking – Determine where individuals are and where they have individuals are and where they have beenbeen

Hotlisting – Single out certain Hotlisting – Single out certain individuals because of the items they individuals because of the items they possesspossess

Profiling – Identifying the items an Profiling – Identifying the items an individual has in their possessionindividual has in their possession

Page 47: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 4747

How far can a passive tag be How far can a passive tag be read?read?

metersin distance

MHz) (915frequency

meters/s 103

(meters) wavelength

dBi) (1gain antenna tag

dBi) (6gain antennareader

watt)(1power nsmit reader tra

needed)W (100 tag toavailablepower

4

8

22

2

r

f

xc

fc

G

G

P

P

r

GGPP

T

R

R

T

TRRT

Assume distance limited by power available to run the tag’s circuits.

Page 48: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 4848

Maximum Distances to Read Maximum Distances to Read UHF Passive TagUHF Passive Tag

Antenna GainAntenna Gain

(dBi)(dBi)Distance Distance (meters)(meters)

DistanceDistance

(feet)(feet)

6 (legal)6 (legal) 5.85.8 19*19*

99 8.38.3 2727

1212 11.711.7 3838

1515 16.516.5 5454

*Reality: Today, in the lab 8 to 12 feet.

Page 49: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 4949

What is Privacy?What is Privacy?

Privacy includes the right to make Privacy includes the right to make decisions about one’s own life, to decisions about one’s own life, to keep personal secrets, and to keep keep personal secrets, and to keep secrets about where we come and secrets about where we come and go.go.

It is the right to make decisions It is the right to make decisions without interference from the without interference from the government or economic pressures government or economic pressures from commercial entities.from commercial entities.

Page 50: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 5050

What Privacy is Not!What Privacy is Not!

Privacy does NOT apply to an Privacy does NOT apply to an organization. It only applies to data organization. It only applies to data about an individual, which is called about an individual, which is called personally identifiable data.personally identifiable data.

Privacy is NOT security.Privacy is NOT security.– Security is important to privacy.Security is important to privacy.– Security is only part of the story.Security is only part of the story.

Page 51: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 5151

5 Principles of Privacy5 Principles of Privacy NoticeNotice. There must be no personal-data, record-keeping . There must be no personal-data, record-keeping

systems whose very existence is a secret.systems whose very existence is a secret. AccessAccess. There must be a way for a person to find out what . There must be a way for a person to find out what

information about the person is in a record and how it is information about the person is in a record and how it is used.used.

ChoiceChoice. There must be a way to prevent personal . There must be a way to prevent personal information that was obtained for one purpose from being information that was obtained for one purpose from being used or made available for other purposes without the used or made available for other purposes without the person’s consent.person’s consent.

RecourseRecourse. There must be a way for a person to correct or . There must be a way for a person to correct or amend a record of identifiable information about the amend a record of identifiable information about the person.person.

SecuritySecurity. Any organization creating, maintaining, using, or . Any organization creating, maintaining, using, or disseminating records of identifiable personal data must disseminating records of identifiable personal data must assure the reliability of the data for their intended use and assure the reliability of the data for their intended use and must take reasonable precautions to prevent misuse of the must take reasonable precautions to prevent misuse of the data.data.

Page 52: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 5252

Alan F. Westin’s Privacy Alan F. Westin’s Privacy ClassificationsClassifications

Privacy Fundamentalist (11%)Privacy Fundamentalist (11%)– Very concernedVery concerned– Unwilling to provide dataUnwilling to provide data

Privacy Unconcerned (13%)Privacy Unconcerned (13%)– Mild concernMild concern– Willing to provide dataWilling to provide data

Privacy Pragmatists (75%)Privacy Pragmatists (75%)– Somewhat concernedSomewhat concerned– Willing to provide data if they are notified and Willing to provide data if they are notified and

get a benefitget a benefit

Page 53: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 5353

Future WorkFuture Work

Study and develop a systemic Study and develop a systemic solution to quantify and control solution to quantify and control privacy when exchanging personally privacy when exchanging personally identifiable data.identifiable data.

This will create a more secure RFID This will create a more secure RFID system that provides privacy system that provides privacy assurance by protecting the privacy assurance by protecting the privacy of individuals.of individuals.

Page 54: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 5454

ReferencesReferences N. Chaudhry, D. R. Thompson, and C. Thompson, N. Chaudhry, D. R. Thompson, and C. Thompson, RFID Technical Tutorial and Threat RFID Technical Tutorial and Threat

ModelingModeling, ver. 1.0, tech. report, Dept. of Computer Science and Computer Engineering, , ver. 1.0, tech. report, Dept. of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas, Dec. 8, 2005. Available: University of Arkansas, Fayetteville, Arkansas, Dec. 8, 2005. Available: http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid

S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo, “Security analysis of a S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo, “Security analysis of a cryptographically-enabled RFID device,” in cryptographically-enabled RFID device,” in Proc.14th USENIX Security SymposiumProc.14th USENIX Security Symposium, , Baltimore, MD, USA, July-Aug. 2005, pp. 1-16.Baltimore, MD, USA, July-Aug. 2005, pp. 1-16.

EPCglobal Inc., http://www.epcglobalinc.org/ EPCglobal Inc., http://www.epcglobalinc.org/ EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for

Communications at 860 MHz – 960 MHzCommunications at 860 MHz – 960 MHz, ver. 1.0.9, EPCglobal Inc., Jan. 31, 2005. Available: , ver. 1.0.9, EPCglobal Inc., Jan. 31, 2005. Available: http://www.epcglobalinc.org/.http://www.epcglobalinc.org/.

K. Finkenzeller, K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identificationand Identification, R. Waddington, Trans.,, R. Waddington, Trans., 2nd ed2nd ed.., Hoboken, New Jersey: John Wiley & Sons, , Hoboken, New Jersey: John Wiley & Sons, 2003.2003.

S. Garfinkel and B. Rosenberg, Eds., S. Garfinkel and B. Rosenberg, Eds., RFID: Applications, Security, and PrivacyRFID: Applications, Security, and Privacy, Upper Saddle , Upper Saddle River, New Jersey: Addison-Wesley, 2006.River, New Jersey: Addison-Wesley, 2006.

S. Karthikeyan and M. Nesterenko, “RFID security without expensive cryptography,” in S. Karthikeyan and M. Nesterenko, “RFID security without expensive cryptography,” in Proc. Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Alexandria, VA, USA, , Alexandria, VA, USA, Nov. 2005, pp. 63-67.Nov. 2005, pp. 63-67.

Opinion Research Corporation and Alan F. Westin. Opinion Research Corporation and Alan F. Westin. "Freebies" and Privacy: What Net Users "Freebies" and Privacy: What Net Users Think.Think. Sponsored by Privacy & American Business. Hackensack, NJ: P & AB, July 1999. Sponsored by Privacy & American Business. Hackensack, NJ: P & AB, July 1999. Available: http://www.privacyexchange.orgAvailable: http://www.privacyexchange.org

M. R. Rieback, B. Crispo, and A. S. Tanenbaum, “Is your cat infected with a computer M. R. Rieback, B. Crispo, and A. S. Tanenbaum, “Is your cat infected with a computer virus?,” in virus?,” in Proc. IEEE Int’l. Conf. Pervasive Computing and Communications (PerCom)Proc. IEEE Int’l. Conf. Pervasive Computing and Communications (PerCom), Pisa, , Pisa, Italy, Mar. 13-17, 2006.Italy, Mar. 13-17, 2006.

Verichip, http://www.verichipcorp.com/Verichip, http://www.verichipcorp.com/

Page 55: Http://csce.uark.edu/~drt/rfid1 RFID Technical Tutorial Presented by: Dale R. Thompson Dept. of Computer Science and Computer Engineering University of

http://csce.uark.edu/~drt/rfidhttp://csce.uark.edu/~drt/rfid 5555

Contact InformationContact Information

Dale R. Thompson, P.E., Ph.D.Dale R. Thompson, P.E., Ph.D.Department of Computer Science and Department of Computer Science and

Computer EngineeringComputer EngineeringUniversity of ArkansasUniversity of Arkansas311 Engineering Hall311 Engineering HallFayetteville, Arkansas 72701Fayetteville, Arkansas 72701Phone: +1 (479) 575-5090Phone: +1 (479) 575-5090FAX: +1 (479) 575-5339FAX: +1 (479) 575-5339E-mail: [email protected]: [email protected]: http://csce.uark.edu/~drt/WWW: http://csce.uark.edu/~drt/