rfid security ppt

14
By : Anil Kumar Student ,BCA V semester(Roll-no. -5) School of Computer And Systems Sciences Jaipur National University Jaipur RFID Security

Upload: sandeep-singh

Post on 02-Jul-2015

389 views

Category:

Technology


13 download

DESCRIPTION

This related to radio frequency identification technology.

TRANSCRIPT

Page 1: RFID security ppt

By :Anil Kumar

Student ,BCA V semester(Roll-no. -5)

School of Computer And Systems Sciences

Jaipur National University

Jaipur

RFID Security

Page 2: RFID security ppt

INTRODUCTION

Radio-Frequency Identification (RFID) is the use of radio waves to read and capture information stored on a tag attached to an object.

The RFID technology is a means of gathering data about a certain item without the need of touching or seeing the data carrier, through the use of inductive coupling or electromagnetic waves.

Page 3: RFID security ppt

RFID Principle’s

RFID devices into two classes: active and passive.

Active tags require a power source—they’re either connected to a powered infrastructure or use energy stored in an integrated battery. In the latter case, a tag’s lifetime is limited by the stored energy, balanced against the number of read operations the device must undergo. One example of an active tag is the transponder attached to an aircraft that identifies its national origin.

Passive RFID is of interest because the tags don’t require batteries or maintenance. The tags also have an indefinite operational life and are small enough to fit into a practical adhesive label.

Page 4: RFID security ppt

RFID SECURITY BENEFITS AND THREATS

Such as airline passenger and baggage tracking, can be made practical by using RFID systems. Authentication systems already take advantage of RFID technology, for example car key-less entry systems. Embedding RFID tags as seals of authenticity in documents, designer products, and currency may discourage forgery. While RFID tags improve certain security properties in these applications, they may exacerbate privacy threats or pose new security risks.

RFID systems are different from other means of identification because RF communication is non-contact and non-line-of-sight, whereas other means of identification are either contact-based or require line-of-sight. In other words,

Page 5: RFID security ppt

SECURITY OF RFID SYSTEMS

The consideration of RFID system security can be addressed on different levels: the field of security for middleware and databases has been generally ad-dressed in information technologies and internet based systems during the recent decade.

Basic principles for attacking such RFID front-end systems are among others:

• Sniffing• Spoofing• Replay• Denial-of-service attacks• Relay attacks and• Unauthorized tracking.

Page 6: RFID security ppt

SECURITY OF RFID SYSTEMS

Generally the following security requirements have to be considered in the context of RFID systems:

• Functional Reliability• Authenticity• Confidentiality• Integrity• Availability• Liability and• Data privacy Symmetric encryption methods are not suitable, since the effort for a

secure key management is comparatively high and not affordable at the required limited transponder Complexities/costs. Furthermore there is a certain risk that secret keys could be revealed by reverse engineering and this in effect would compromise the whole security concept.

Page 7: RFID security ppt

SECURITY OF RFID SYSTEMS

Therefore new lightweight cryptography methods are required, including effective methods for the on-tag generation of random numbers and the computation of hash functions. Concepts as physically unlovable functions may show a way out of the security at high implementation cost dilemma. This contribution summarizes essential results of a RFID security report, supported by the German Ministry of Research and Education (BMBF), which has been published in spring 2007.

Finally we’ll provide a roadmap for ongoing research and development targeting secure RFID system solutions.

Page 8: RFID security ppt

RFID SYSTEMS

RFID system has a structure as depicted in figure. RFID readers scan tags, and then forward the information to the backend. The backend in general consists of a database and a well-defined application interface.

Page 9: RFID security ppt

HOW DOES RFID WORK?

An RFID tag, or transponder, that carries object-identifying data.

An RFID tag reader, or transceiver, that reads and writes tag data.

A back-end database, that stores records associated with tag contents.

Page 10: RFID security ppt

RFID APPLICATION

As manufacturing costs dropped, RFID systems began to be used for lower-value items in industries besides transport.

Automobiles, railcars, and shipping containers are all high-value items, with ample physical space that can accommodate more expensive and bulky RFID devices.

Early commercial examples of RFID applications include automatic tracking of train cars, shipping containers, and automobiles

Other widespread applications of RFID systems include contactless payment, access control, or stored-value systems.

Page 11: RFID security ppt

RFID APPLICATION

Livestock, particularly cattle, are often labeled with a RFID device that is clamped or pierced through their ear, attached to a collar, or swallowed. Unlike implanted pet tags, these RFID Devices are rugged and able to be read from greater distances. Concerns over Bovine Spongiform Encephalopathy (mad cow) disease have motivated proposals for universal tracking of livestock with these types of RFID systems. Like transport applications, animal tracking is still essentially a low-volume, high-value market that may justify relatively expensive RFID systems.

Page 12: RFID security ppt

CONCLUSION

Strong security properties are achievable within simple security protocol designs that are suitable for implementation in RFID systems. In this paper, we described about the RFID, principle, application, benefits using of RFID, how does its work etc. protocol for anonymous RFID identification that simultaneously achieves security against tracking, cloning, and disabling of tags, and that is not vulnerable to replay attacks. Recently, O-TRAP has been extended to provide forward-security.

Page 13: RFID security ppt

References

http://www.infosec.gov.hk/english/technical/files/rfid.pdf http://www.cs.fsu.edu/~burmeste/133.pdf http://www.cs.vu.nl/~ast/publications/ieeepc-2006.pdf http://usenix.org/events/sec05/tech/bono/bono.pdf http://www.ee.tamu.edu/~reddy/ee689_06/nikhilkrishna.

pdf http://www.softscheck.com/.../Pohl_Knospe_RFID_Secrity

_050126.pdf http://home.iitk.ac.in/~chebrolu/sensor/rfid-security.pdf http://hal.inria.fr/docs/00/63/70/61/PDF/RFID_chapter_v

9.pdf http://www.cs.uu.nl/research/techreps/repo/CS2013/20130

01.pdf

Page 14: RFID security ppt

Thanks' for Watching