Download presentation
Presentation is loading. Please wait.
Published byEugene O’Neal’ Modified over 9 years ago
1
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar
2
Introduction Automatic Identification method for storing and retrieving data remotely Small object which is embedded inside a person, animal or any product A silicon microchip mainly Integrated Circuit attached to Antenna for Transmitting and receiving of data.
3
RFID reader wirelessly communicate with the tag to retrieve information The Reader and tag communicates with each other through Radio Frequency Introduction (continue…)
4
RF Subsystem RFID Tags - Electronic device Affix inside any object. - Each Tag has Unique Identifier. - Has memory, environment sensors and security mechanism. RFID Readers - Communicates with RFID Tags RFID Tags and Readers are 2 way communication.
5
RFID Tag Characteristics Identifier Format - Uniquely identifies tags - Data Format used is Electronic Product Code. - Four data fields HeaderEPC Manager IdObject ClassSerial Number Specifies EPC type Uniquely Define the organization responsible Uniquely identifies class object Uniquely identifies instants of class object
6
Power Source 1. Passive: - Has no internal power supply - Incoming radio frequency gives enough power to CMOS IC to power up - Antenna is designed to collect power. RFID Tag Characteristics (Continue)
7
2. Active - Has own internal power source - Uses for high power source, in water and may have sensors 3. Semi Passive - Has battery but only powers the IC and does not help in transmitting any signal - Usually stores energy RFID Tag Characteristics (continue)
8
RFID Security Controls RFID Usage Policy - Authorized and Unauthorized use of RFID Minimizing sensitive Data Stored on Tag HMAC Tag Memory Access Control Encryption of Data
9
Authentication Assurance of identity of an entity at other end Secret Key or Public key Cryptography is used Public key Cryptography is more preferable since there is no key exchange and public key is transfer through digital signature Two methods - Zero Knowledge Protocol - Challenge Response Protocol
10
Challenge Response Protocol Reader sends challenge to the RFID tag The challenge is encrypted public key made from private key RFID Tag decrypts the response with its on private key and result is same along with sending a response to the Reader RFID Tag has EPROM memory to store the private key with microcontroller to process the request.
11
RFID TAG With Authentication Mechanism Challenge Response Protocol (continue)
12
Protocol Implementation Challenge Response Protocol (continue)
13
Applications Tracking goods during supply chain and manufacturing process. Controlled access to building or network Scanning objects Payment systems Airline passenger and baggage tracking made practical and less intrusive Authentication systems already in use (key-less car entry)
14
Types of Attack Spoofing Incorrect data, e.g. wrong domains Insert SQL Injection Replay Original message replayed later Denial of Service Signal with redundant data flooding
16
Attacks Cont. Blended Attacks attack the RF interface of a retailer
17
Electronic Product Code EPC The EPC is the fundamental identifier for a physical object. Auto-ID Electronic Product Code Data Specification 1.0 defines the abstract content of the EPC in the form of RFID tags, Internet URLs, and other representations.
18
RFID Middleware Overview
19
DES Encryption Algorithm
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.