Www.milpac.com RFID Technology Issues Interactive discussion. Intended to elicit comments and questions to lead towards White Paper outline.

Slides:



Advertisements
Similar presentations
A Comprehensive Study for RFID Malwares on Mobile Devices TBD.
Advertisements

CS 854 – Hot Topics in Computer and Communications Security Fall 2006 Introduction.
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
1 Copyright © 2005, Cisco Systems, Inc. All rights reserved. Applying Security Principles to Networking Applications Mark Enright Dec.
Radiofrequency Identification for movable heritage management Central International Archive of Art Objects Member of Albert Canals – General Director AICOA.
Defense Supply Center Philadelphia (DSCP) Directorate of Clothing and Textiles Radio Frequency Identification Tags (RFID) RFID Solutions Alicia McGee,
Chapter 15 Radio Frequency Site Survey Fundamentals
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Doc.: IEEE /151r0 Submission Oct Jesse Caulfield, Key Bridge Global LLCSlide 1 Interfacing the White Space Database Notice: This document.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
1 CSCD 439/539 Wireless Networks and Security Lecture 1 Overview Fall 2007.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
RFID Technology in Healthcare Presenters: Lauren Gunn and Connor Zale.
IWD2243 Wireless & Mobile Security
Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic.
Applied Communications Technology n.a.shulver, March 2012 updated March 2013 RFID identification 1.What is RFID? 2.Some examples 3.How does it work? 4.Industrial.
Site on Wheels AWIN Network Support. Table of Contents What is a Site on Wheels (SOW)? How does a SOW differ from a COW? When should a SOW be deployed.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
RFID and RFID tags. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using.
MINIATURE RFID READER 1.55 Square Inch UHF Generation 2 ISO C Combination RFID Reader/Writer Communicates with Active and Passive Tags
Suriya, A. September 19, 2015, Slide 0 Atipong Suriya School of MIME March 16, 2011 FE 640 : Term Project Presentation RFID Network Planning using Particle.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Section 1 Understanding how ICT can be used to meet business needs.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
Overall: 9/10. GOODWORK ON  Good information  Very detailed  Nice Introduction  RFID has many similarities with barcoding but with the unique characteristics.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos.
Computer Information Technology – Section 5-4.  Objectives:  The students will 1. Understand the options on the Printer's Document Properties dialog.
Chapter 10 Creating a Template for an Online Form Microsoft Word 2013.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
 Things you may not know…  Why should we be secure?  How to secure your computer  Security Types.
PM LAV...Global Vision - Global Mission 1 7/23/2016 PMLAV IUID Implementation Bob Appleton.
Wireless Security By: Bryan M Keller.
CS101 Security.
What is a Radio-Frequency Identification (RFID) tag?
Radio Frequency Identification (RFID)
CYB 110 Competitive Success/snaptutorial.com
CYB 110 Teaching Effectively-- snaptutorial.com
Technology, Issues, and Solutions by David Clark
Cold Chain Monitoring.
Team 7 Technical Presentation
CS101 Security.
Radio Frequency Identification
Assignment How would you find out what soil you have in your research area?
RFID Portal Test Rfscl Laboratory UNL.
Selective Blocking of RFID Tags for Consumer Privacy
ESO response to EU RFID Mandate M/436
LM 5. Wireless Network Security
Ubiquitous Computing Vision - continued
CS101 Security.
Presentation transcript:

RFID Technology Issues Interactive discussion. Intended to elicit comments and questions to lead towards White Paper outline.

Discussion Topics Security Discussion Site Preparation Issues Tag Selection & Placement

RFID Security RFID systems are similar to wireless networks in terms of security vulnerabilities Attacks fall into two categories  Passive Attacker “ listens ”  Active Deliberate, malicious actions

RFID Security - Passive Same threat as barcode & human readable Tag Contents are:  Pallet/Case/UID + CAGE + Serial Number  Add Part Number if using EPC Global format

RFID Security - Active Same threat as barcode & human readable New Standards (Class 1, Gen 2) provides improved security:  Much longer passwords for: Query Tag Data Kill Tag Lock Tag Data (Permanent or Temporary)  Better data encryption

Site Preparation Issues Risks:  Bi-directional Interference  Human exposure Passive RFID operates in a range of 20 ft or less  Suggest site survey only when site inspection reveals need Printer, Mobile, Stationary Options

Tag Selection & Placement Tag Selection  Different antenna configurations = performance differences  Start with “ middle of the road ” tag and change tag if needed  Test thoroughly in pilot study

Tag Selection & Placement Tag Placement  Mil-Std 129 dictates placement of carton markings  RFID is affected by fluids and metals  Corrugated cartons are easy  Test thoroughly

? ? ? ? ? ? ? ? ? ? ? ? ? ? ? Questions Concerns Action Items