Download presentation
Presentation is loading. Please wait.
Published byAliya Mealing Modified over 10 years ago
1
SMUCSE 7349 RFID Security
2
SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War II: RFID makes supply chain reliable – Proctor & Gamble Elimination of dock bottleneck: fast loading of palettes onto trucks Inventory control (i.e., theft-prevention) – Air Canada tracking of food carts – Gillette Tracking Mach3 razor blades Ordered 3 million Refining the retail experience Payment technologies – Exxon/Mobil Speedpass
3
SMUCSE 7349 Future Applications Maintaining shelf stocks in retail environments Tagging pets Proximity badges for building access Clothing – anti-forgery, customer returns Parenting logistics – Water park uses RFID bracelets to track children Smart appliances –Refrigerators that automatically create shopping lists –Ovens that know how to cook pre-packaged food Smart products –Clothing, appliances, CDs tagged for store returns Smart paper –Airline tickets that indicate your location in the airport –Library books –Business cards Recycling –Plastics that sort themselves
4
SMUCSE 7349 RFID Viability Expensive tags were OK for high tickets Price has to go below 0.05$ –A recent purchase involved 500 million tags purchased by retialer Once viable (as predicted) RFID could be the most widely deployed chip Promise is to replace the 5 billion barcode scans/day
5
SMUCSE 7349 Basic Components RFID Tag –Transponder –Located on the object to be identified RFID Reader –Transceiver –Can read and write data to Tag Data Processing Subsystem –Connects to reader
6
SMUCSE 7349 Security Issues Privacy –Business –Personal Denial of service Incorrect information Forgeries
7
SMUCSE 7349 Cost-Security Trade-off Low cost –Low intelligence (up to 5000 gates) –Low storage (few hundred bits) –Low range (few meters) Security –AES needs 20-30 thousand gates –Hash such as SHA-1 also needs similar order –TEA algorithm still not feasible
8
SMUCSE 7349 Forward and Backward Channels
9
SMUCSE 7349 Hash-Based Access Control
10
SMUCSE 7349 Randomized Access Control
11
SMUCSE 7349 Anti-Collision Algorithms Probabilistic –Tags respond in randomly generate times –Slotted Aloha scheme Deterministic - Binary tree-walking scheme –Space of k-bit identifiers –k-bit identifiers leaves in a tree of depth k –Reader sorts through tags based on tag-ID Traverses tree asking subsets of tags to broadcast a single bit at a time. –RFID reader broadcasts tag serial numbers over very large distances May introduce vulnerability to eavesdropping.
12
SMUCSE 7349 Silent Tree Walking
13
SMUCSE 7349 Other Measures Proactive detection of intruders Chaffing and Winnowing –Confidentiality without encryption Deliberate DoS for privacy
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.