27
RFID Outline Introduction The Basics Working of RFID Concerns Applications Pros and Cons Conclusion RFID Based Tracking System Shahrukh Ayaz Khan Seminar Presentation SSBT’s College of Engineering & Technology, Bambhori, Jalgaon - 425 001, Maharashtra, India April 10, 2015 April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 1/27

RFID based tracking System

Embed Size (px)

Citation preview

Page 1: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

RFID Based Tracking System

Shahrukh Ayaz KhanSeminar Presentation

SSBT’s College of Engineering & Technology,Bambhori, Jalgaon - 425 001, Maharashtra, India

April 10, 2015

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 1/27

Page 2: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Presentation Outline

1 Introduction

2 The Basics

3 Working of RFID

4 Concerns

5 Applications

6 Pros and Cons

7 Conclusion

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 2/27

Page 3: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Outline

1 Introduction

2 The Basics

3 Working of RFID

4 Concerns

5 Applications

6 Pros and Cons

7 Conclusion

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 3/27

Page 4: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Introduction

In last few years RFID technology has become a majordriver for various business like logistics, supply chainmanagement and acess control

Many of these applications have based on successfulimplementations of RFID tags but on reader’s side weshow how semi-passive tags helps implementing andattacking security enhanced RFID.

It has various security and privacy concerns, which is dueto the inherent vulnerabilities in the architecture of theRFID system..

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 4/27

Page 5: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

What is RFID?

Radio Frequency Identification

Uses Radio Frequency waves to transfer data between areader and a tag to identify, categorize, track...

One form of Automatic Identification

RFID is fast reliable and does not require physical sight orcontact between reader/scanner and the tagged item.

Provides unique identification or serial number of anobject (pallets, cases, items, animals, humans

Some of the large companies like Microsoft and Wallmartare mandating their suppliers to use RFIDs to cut theirwarehousing costs and other relating expenses

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 5/27

Page 6: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Outline

1 Introduction

2 The Basics

3 Working of RFID

4 Concerns

5 Applications

6 Pros and Cons

7 Conclusion

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 6/27

Page 7: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Why was RFID invented?

Like most technologies used today, RFID got it start fromWWII. The parent technology of RFID is transponder.

Transponders are radio devices that can recieve or sendsignals. They are found virtually on all aircrafts andwatercrafts.

In WWII transponders were used as IFF (identify Friend orFoe) to distinguish Allied Aircraft from enemey ones.

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 7/27

Page 8: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Key Components of RFID system

A RFID system is made up of two parts: a tag or label anda reader.RFID tags or labels are embedded with a transmitter anda receiver.The RFID component on the tags have two parts: amicrochip that stores and processes information, and anantenna to receive and transmit a signal.RFID Reader is also known an interrogator

Figure: Basic Parts of RFID systemApril 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 8/27

Page 9: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

RFID Tag

Figure: RFID TAG

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 9/27

Page 10: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Types of tags

Passive: gets energy from reader

Active: battery powered

Semi-passive: battery and energy from reader TheSemi-passive tags are mainly targeted for the security andprivacy attacks

Figure: Use of tags

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 10/27

Page 11: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Outline

1 Introduction

2 The Basics

3 Working of RFID

4 Concerns

5 Applications

6 Pros and Cons

7 Conclusion

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 11/27

Page 12: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

How it works?

Figure: Working of RFID

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 12/27

Page 13: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

How it Works?

The tag contains the specific serial number for one specificobject.

To read the information encoded on a tag, a two-wayradio transmitter-receiver called an interrogator or readeremits a signal to the tag using an antenna.

The tag responds with the information written in itsmemory bank.

The interrogator will then transmit the read results to anRFID computer program.

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 13/27

Page 14: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Outline

1 Introduction

2 The Basics

3 Working of RFID

4 Concerns

5 Applications

6 Pros and Cons

7 Conclusion

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 14/27

Page 15: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Security and Privacy challenges

RFID Tag Cloning Attack :cloning is done by forging thedata from an authentic tag generally into a blank tag

Physical Attack: Any kind of tampering to tagarchitecture depending upon intention of attacker

Skimming Attack: Usually done by reading the data of tagwithout authorization of tag holder

Spoofing Attack: Attacker try to act like a reader inorderto interrogate tags

Relay Attack: Attacker acts an Man In Middle betweentag and reader

Denial of Services(DOS) Attack: It involves jamming ofoperating frequency of communication channel

Clandestine Tracking: It exploits the ubiquitous nature ofthe tag, thus making it a very easy attack prone

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 15/27

Page 16: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Sucessful Attacks

HID cards (2007)

Britsh e-Passports(2008)

RFID credit cards(2009)

Sacremento Capitol access cards(2010)

Human Implantable ”VERICHIP”(2010)

Dutch e-Passports(2009)

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 16/27

Page 17: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Outline

1 Introduction

2 The Basics

3 Working of RFID

4 Concerns

5 Applications

6 Pros and Cons

7 Conclusion

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 17/27

Page 18: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Some of the Applications

People/Animal tracking

Figure: Animal/ Human Tracking

Manufacturing or Supply chain Management

Figure: Supply Chain Mangement

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 18/27

Page 19: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Contd..

Government Issued Machine readable travel documents

Figure: e-Passports

Toll collection and contactless payment

Figure: Toll booth

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 19/27

Page 20: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Contd..

Library management

Figure: Library Managing

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 20/27

Page 21: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Recent Innovation

Small RFID chip, here compared to a grain of rice, isincorporated in consumer products, and implanted in pets,for identification purposes

Figure: Small RFID chip ”Verichip”

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 21/27

Page 22: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Outline

1 Introduction

2 The Basics

3 Working of RFID

4 Concerns

5 Applications

6 Pros and Cons

7 Conclusion

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 22/27

Page 23: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Advantages

Inventory efficiencyVulnerability to damage minimizedEasy to useHigh memory capacityCannot be easily replicated and therefore, it increases thesecurity of the product.Simple to install/inject inside the body of animals/humanbeings

Disadvantages

Security concerns like possibility of unauthorized reading ofpassports and credit cardsMore expensive than barcode systemUnread tagsDoesnt work properly on liquids and metal products.

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 23/27

Page 24: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Outline

1 Introduction

2 The Basics

3 Working of RFID

4 Concerns

5 Applications

6 Pros and Cons

7 Conclusion

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 24/27

Page 25: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Conclusion

In this research, we identified the various challenges facingRFID Card, with careful references.

We also highlighted the diverse application areas of theRFID technology

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 25/27

Page 26: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

References

1 D. Anthony, T. Henderson, and D. Kotz, Privacy inlocation aware computing environments, IEEE PervasiveComputing,2009.

2 A. Beresford and F. Stajano, Location privacy in pervasivecomputing, IEEE Pervasive Computing, 2011.

3 A. R. Beresford and F. Stajano, Mix zones: User privacy inlocation-aware services, in Pervasive Computing andCommunications Workshops (PERCOMW), 2008.

4 J. I. Hong and J. A. Landay, An architecture for privacysensitive ubiquitous computing, in International conferenceon Mobile systems, applications, and services (MobiSys),2009.

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 26/27

Page 27: RFID based tracking System

RFID

Outline

Introduction

The Basics

Working ofRFID

Concerns

Applications

Pros and Cons

Conclusion

Thank You...ShahrukhA.Khan

April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 27/27