SlideShare a Scribd company logo
1 of 24
RFID Security and Privacy



    Presented by: Shahryar Ali
Contents..



 Introduction
  Introduction

 Problem identification
 Problem identification

 Research methodology
 Research methodology

 Pros and cons
 Pros and cons

 Conclusion
 Conclusion
Introduction..

                               RFID


       Tag                                       RFID Reader
                                           .




   RFID is an electronic identification technique.

   Used to identify any kind of object through radio frequency.
   Tag contains a unique identification number or code.

   Two types of tags:
     – Active tags
     – Passive tags
RFID reader..
   Purpose of the Reader is to identify the EPC-number of
    the tag.

   Reading of tag depends on the operating frequency.

   Methods of transferring power to the tag:
     – Magnetic induction
     – Electromagnetic wave capture.


   Power is typically between 10 microwatt and 1 miliwatt.
Problem Identification..

   RFID can be used for human tracking.

   Shopkeepers can trace customers.

   Procter and gamble has been caught spying on its
    customers.

   Gillette has hidden RFID tags in shaving products.

   Tag’s in people’s home will be read by a passing car.
Research Methodology
RFID Security and Privacy
     By Charalampos Zois University of Amsterdam May 2007




   Computer cryptographers and programmers have
    proposed many countermeasures against these dangers.

   Main challenge is to provide significant improvement in
    privacy without raising cost.
Kill RFID Tag..

   If you don’t want RFID Tag, then physically disable it.
   Once you remove it, you can never re-activate it.




Faraday Cages ..

 Faraday cage is a type of foil or metal.
 It is resistant to some radio frequencies.
 We cannot place every product in a faraday cage.
Cryptographic approaches..

 Tags interact with reader by public-key protocol.
 Strong public key is too heavy-weight for the tags




Clipped tags…

 Separate the RFID code area from the antenna.
 Customer gets the visual evidence of deactivation.
 Tag reactivates through some electromechnical means.
Hash based access control..




Randomized hash based access control..

   Generate a random number on tag instead of a fixed
    number.
   Increases the complexity of RFID tags
Blocker Tags..

 Blocker tag breaks the communication between the reader
  and itself.
 Tree-walking singulation algorithm is used.
 Economical and easy to implement.




Silent Tree Walking...

 Strong eavesdropper can listen into the signal.
 We don't broadcast each and every bit of an RFID tag in
  the process of tree walking.
Tag Identification algorithm..

 Matrix multiplication.
 Both reader and tag use two matrices of same size.
 X=k.M1




Privacy through Trusted Computing…

   Use of trusted reader:
     – Reader core
     – Policy engine
     – Consumer agent
The RFID Guardian..
   Device which controls the communication between RFID
    reader and tags.

   Portable and battery inside it.

    Complete privacy:
    –  Auditing
    –  Key management
    –  Access control
    –  Authentication
RFID Jamming
                         Guido R. Kok




•   Harmful to the one's privacy and personal space


•   How to avoid unnecessary detection and information
    querying
Techniques to prevent Privacy..


•   Radio Jamming
•   The blocker tag
•   Selective blocker tag
•   Selective RFID jamming
Radio Jamming..
•   Signal of high power and of same frequency is generated.
•   Mobile jamming device is required.
•   All communication at that frequency is blocked.




Blocker tag..

•   Simultaneous query of multiple tags can block the RF
    reader.
•   Use of walking tree protocol.
Walking Tree Protocol..

• Tag database is saved in a Binary Tree.


• Bit by bit enquiry of EPC is done.


• In case of collision the “Left Search 1st
  technique ” is applied.


• At each point when the RF reader asks for
  the next bit. Both ‘1’ and ‘0’ are sent.


• So 2^96 collision, it will block the reader
  easily.
Selective Blocker Tag..


•   Only certain tags or group of tags are blocked
Selective RFID jamming..

•   The jamming signal is used to block the unwanted queries.
•   But only the unauthenticated requests are blocked.
•   The jammer used is a bit smarter and looks into the ACL
    for authentication.




Access control list..

•   Holds information about the RF readers, that which
    particular one is authorized.
Pros and Cons..

RFID security and privacy:

Pros:


    More than 12 methods of privacy prevention.

    Cryptographic techniques are also explained.


Cons:

   Laws and regulations under which RFID systems work are not
    explained.
   Blocker tag method is not explained in detail.
RFID Jamming:

Pros:

   Drawbacks of each technique are explained.




Cons:


   Laws and regulation regarding the use of RFID are not
    mentioned.
   Cryptographic Techniques are not mentioned.
Conclusion:
Which is the best method to improve security and
privacy?


We think, it is RFID Guardian.




But..

• Blocker tag is the most practical solution.
• it’s economical and suitable for existing RFID
  market in the world.
Thank You !

More Related Content

What's hot

Simple Introduction about RFID
Simple Introduction about RFIDSimple Introduction about RFID
Simple Introduction about RFIDYudhi Irawan
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMavinash yada
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemMahmudul Hasan
 
Access control system using RFID and zigbee
 Access control system using  RFID and zigbee  Access control system using  RFID and zigbee
Access control system using RFID and zigbee Pradheep Shrinivasan
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee trackinggiri529
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance systemA.k. Goverdhan
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFIDMiguel Pardal
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology Ho Vu
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentationAkash Maurya
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMSuvendu Kumar Dash
 
RFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTRFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTnikhilpatewar
 

What's hot (20)

rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Simple Introduction about RFID
Simple Introduction about RFIDSimple Introduction about RFID
Simple Introduction about RFID
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access System
 
Rfid cards
Rfid cardsRfid cards
Rfid cards
 
Access control system using RFID and zigbee
 Access control system using  RFID and zigbee  Access control system using  RFID and zigbee
Access control system using RFID and zigbee
 
Rfid technology and applications
Rfid  technology and applicationsRfid  technology and applications
Rfid technology and applications
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
RFID based Attendance System
RFID based Attendance SystemRFID based Attendance System
RFID based Attendance System
 
Rfid based employee tracking
Rfid based employee trackingRfid based employee tracking
Rfid based employee tracking
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
RFID
RFIDRFID
RFID
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance system
 
Rfid security access control system
Rfid security access control systemRfid security access control system
Rfid security access control system
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFID
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEM
 
RFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTRFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPT
 

Viewers also liked

Ubiquitious Computing system : Integrating RFID with Face Recognition systems
Ubiquitious Computing system : Integrating RFID with Face Recognition systemsUbiquitious Computing system : Integrating RFID with Face Recognition systems
Ubiquitious Computing system : Integrating RFID with Face Recognition systemsShahryar Ali
 
Competetive anaylsis - British Telecom(BT)
Competetive anaylsis - British Telecom(BT)Competetive anaylsis - British Telecom(BT)
Competetive anaylsis - British Telecom(BT)Shahryar Ali
 
Next generation networks
Next generation networksNext generation networks
Next generation networksShahryar Ali
 
Digital Signage Platform Aoe
Digital Signage Platform AoeDigital Signage Platform Aoe
Digital Signage Platform Aoewoodmeister1964
 
Green rev slideshow
Green rev slideshowGreen rev slideshow
Green rev slideshowglpeacejam
 
Convention marketing plan presentation slide
Convention marketing plan presentation slideConvention marketing plan presentation slide
Convention marketing plan presentation slidechiaboon
 
Network Virtualization for Cloud Services Infrastructure
Network Virtualization for Cloud Services InfrastructureNetwork Virtualization for Cloud Services Infrastructure
Network Virtualization for Cloud Services InfrastructureShahryar Ali
 
A change for change
A change for changeA change for change
A change for changekimdejong77
 
Introduction to Wimax
Introduction to WimaxIntroduction to Wimax
Introduction to WimaxShahryar Ali
 
Slam12 Nobel presentation
Slam12 Nobel presentationSlam12 Nobel presentation
Slam12 Nobel presentationglpeacejam
 
2012, the awakening of the Vietnamese Game Development - Game designer’s job ...
2012, the awakening of the Vietnamese Game Development - Game designer’s job ...2012, the awakening of the Vietnamese Game Development - Game designer’s job ...
2012, the awakening of the Vietnamese Game Development - Game designer’s job ...nhismxuf
 
2012, the awakening of the Vietnamese Game Development - Presentation multi p...
2012, the awakening of the Vietnamese Game Development - Presentation multi p...2012, the awakening of the Vietnamese Game Development - Presentation multi p...
2012, the awakening of the Vietnamese Game Development - Presentation multi p...nhismxuf
 

Viewers also liked (17)

Ubiquitious Computing system : Integrating RFID with Face Recognition systems
Ubiquitious Computing system : Integrating RFID with Face Recognition systemsUbiquitious Computing system : Integrating RFID with Face Recognition systems
Ubiquitious Computing system : Integrating RFID with Face Recognition systems
 
Competetive anaylsis - British Telecom(BT)
Competetive anaylsis - British Telecom(BT)Competetive anaylsis - British Telecom(BT)
Competetive anaylsis - British Telecom(BT)
 
Next generation networks
Next generation networksNext generation networks
Next generation networks
 
Práctica 2
Práctica 2Práctica 2
Práctica 2
 
Digital Signage Platform Aoe
Digital Signage Platform AoeDigital Signage Platform Aoe
Digital Signage Platform Aoe
 
Green rev slideshow
Green rev slideshowGreen rev slideshow
Green rev slideshow
 
Presentación Individual
Presentación IndividualPresentación Individual
Presentación Individual
 
Convention marketing plan presentation slide
Convention marketing plan presentation slideConvention marketing plan presentation slide
Convention marketing plan presentation slide
 
Thamra Al Tumur
Thamra Al TumurThamra Al Tumur
Thamra Al Tumur
 
Network Virtualization for Cloud Services Infrastructure
Network Virtualization for Cloud Services InfrastructureNetwork Virtualization for Cloud Services Infrastructure
Network Virtualization for Cloud Services Infrastructure
 
A change for change
A change for changeA change for change
A change for change
 
App Upp Brochure
App Upp BrochureApp Upp Brochure
App Upp Brochure
 
Introduction to Wimax
Introduction to WimaxIntroduction to Wimax
Introduction to Wimax
 
Softskill
SoftskillSoftskill
Softskill
 
Slam12 Nobel presentation
Slam12 Nobel presentationSlam12 Nobel presentation
Slam12 Nobel presentation
 
2012, the awakening of the Vietnamese Game Development - Game designer’s job ...
2012, the awakening of the Vietnamese Game Development - Game designer’s job ...2012, the awakening of the Vietnamese Game Development - Game designer’s job ...
2012, the awakening of the Vietnamese Game Development - Game designer’s job ...
 
2012, the awakening of the Vietnamese Game Development - Presentation multi p...
2012, the awakening of the Vietnamese Game Development - Presentation multi p...2012, the awakening of the Vietnamese Game Development - Presentation multi p...
2012, the awakening of the Vietnamese Game Development - Presentation multi p...
 

Similar to RFID Security and Privacy Research

Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraqmontaser185
 
RFID
RFIDRFID
RFIDdont
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identificationharoonahmed0044
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)Akash Karwande
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Diana Oliva
 

Similar to RFID Security and Privacy Research (20)

Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
RFID
RFIDRFID
RFID
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
(Spring 2012) RFID and Security Vulnerabilities
(Spring 2012) RFID and Security Vulnerabilities(Spring 2012) RFID and Security Vulnerabilities
(Spring 2012) RFID and Security Vulnerabilities
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...
 
Rfid 05
Rfid 05Rfid 05
Rfid 05
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

RFID Security and Privacy Research

  • 1. RFID Security and Privacy Presented by: Shahryar Ali
  • 2. Contents.. Introduction Introduction Problem identification Problem identification Research methodology Research methodology Pros and cons Pros and cons Conclusion Conclusion
  • 3. Introduction.. RFID Tag RFID Reader .  RFID is an electronic identification technique.  Used to identify any kind of object through radio frequency.
  • 4. Tag contains a unique identification number or code.  Two types of tags: – Active tags – Passive tags
  • 5. RFID reader..  Purpose of the Reader is to identify the EPC-number of the tag.  Reading of tag depends on the operating frequency.  Methods of transferring power to the tag: – Magnetic induction – Electromagnetic wave capture.  Power is typically between 10 microwatt and 1 miliwatt.
  • 6. Problem Identification..  RFID can be used for human tracking.  Shopkeepers can trace customers.  Procter and gamble has been caught spying on its customers.  Gillette has hidden RFID tags in shaving products.  Tag’s in people’s home will be read by a passing car.
  • 8. RFID Security and Privacy By Charalampos Zois University of Amsterdam May 2007  Computer cryptographers and programmers have proposed many countermeasures against these dangers.  Main challenge is to provide significant improvement in privacy without raising cost.
  • 9. Kill RFID Tag..  If you don’t want RFID Tag, then physically disable it.  Once you remove it, you can never re-activate it. Faraday Cages ..  Faraday cage is a type of foil or metal.  It is resistant to some radio frequencies.  We cannot place every product in a faraday cage.
  • 10. Cryptographic approaches..  Tags interact with reader by public-key protocol.  Strong public key is too heavy-weight for the tags Clipped tags…  Separate the RFID code area from the antenna.  Customer gets the visual evidence of deactivation.  Tag reactivates through some electromechnical means.
  • 11. Hash based access control.. Randomized hash based access control..  Generate a random number on tag instead of a fixed number.  Increases the complexity of RFID tags
  • 12. Blocker Tags..  Blocker tag breaks the communication between the reader and itself.  Tree-walking singulation algorithm is used.  Economical and easy to implement. Silent Tree Walking...  Strong eavesdropper can listen into the signal.  We don't broadcast each and every bit of an RFID tag in the process of tree walking.
  • 13. Tag Identification algorithm..  Matrix multiplication.  Both reader and tag use two matrices of same size.  X=k.M1 Privacy through Trusted Computing…  Use of trusted reader: – Reader core – Policy engine – Consumer agent
  • 14. The RFID Guardian..  Device which controls the communication between RFID reader and tags.  Portable and battery inside it.  Complete privacy: – Auditing – Key management – Access control – Authentication
  • 15. RFID Jamming Guido R. Kok • Harmful to the one's privacy and personal space • How to avoid unnecessary detection and information querying
  • 16. Techniques to prevent Privacy.. • Radio Jamming • The blocker tag • Selective blocker tag • Selective RFID jamming
  • 17. Radio Jamming.. • Signal of high power and of same frequency is generated. • Mobile jamming device is required. • All communication at that frequency is blocked. Blocker tag.. • Simultaneous query of multiple tags can block the RF reader. • Use of walking tree protocol.
  • 18. Walking Tree Protocol.. • Tag database is saved in a Binary Tree. • Bit by bit enquiry of EPC is done. • In case of collision the “Left Search 1st technique ” is applied. • At each point when the RF reader asks for the next bit. Both ‘1’ and ‘0’ are sent. • So 2^96 collision, it will block the reader easily.
  • 19. Selective Blocker Tag.. • Only certain tags or group of tags are blocked
  • 20. Selective RFID jamming.. • The jamming signal is used to block the unwanted queries. • But only the unauthenticated requests are blocked. • The jammer used is a bit smarter and looks into the ACL for authentication. Access control list.. • Holds information about the RF readers, that which particular one is authorized.
  • 21. Pros and Cons.. RFID security and privacy: Pros:  More than 12 methods of privacy prevention.  Cryptographic techniques are also explained. Cons:  Laws and regulations under which RFID systems work are not explained.  Blocker tag method is not explained in detail.
  • 22. RFID Jamming: Pros:  Drawbacks of each technique are explained. Cons:  Laws and regulation regarding the use of RFID are not mentioned.  Cryptographic Techniques are not mentioned.
  • 23. Conclusion: Which is the best method to improve security and privacy? We think, it is RFID Guardian. But.. • Blocker tag is the most practical solution. • it’s economical and suitable for existing RFID market in the world.