RFID Handbook
eBook - ePub

RFID Handbook

Applications, Technology, Security, and Privacy

  1. 712 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

RFID Handbook

Applications, Technology, Security, and Privacy

About this book

Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world's largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it poses.

The RFID Handbook provides an overview of RFID technology, its associated security and privacy risks, and recommended practices that will enable organizations to realize productivity improvements while also protecting sensitive information and the privacy of individuals.

Expert contributors present a host of applications including RFID enabled automated receiving, triage with RFID for massive incidents, RFID and NFC in relation to mobile phones, and RFID technologies for communication robots and a privacy preserving video surveillance system. The unprecedented coverage also includes detailed descriptions of adaptive splitting protocols as well as tree-based and probabilistic anti-collision protocols.

Drawing on its distinguished editors and world-renowned contributors, this one-of-a-kind handbook serves as the ultimate reference on RFID, from basic research concepts to future applications.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access RFID Handbook by Syed A. Ahson,Mohammad Ilyas in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Operations. We have over one million books available in our catalogue for you to explore.

Information

Section IV

Security and Privacy

26
Is RFID Technology Secure and Private?

Surinder Mohan Bhaskar

CONTENTS

26.1 Introduction
26.2 Problems with RFID
26.2.1 Technology-Related Problems
26.2.1.1 Problems with RFID Standards
26.2.1.2 RFID Systems Can Be Easily Disrupted
26.2.1.3 RFID Reader Collision/Interference
26.2.1.4 RFID Tag Collision
26.2.2 Security, Privacy, and Ethics Problems with RFID
26.2.2.1 Contents of an RFID Tag Can Be Read after the Item Leaves the Supply Chain
26.2.2.2 RFID Tags Are Difficult to Remove
26.2.2.3 RFID Tags Can Be Read without Your Knowledge
26.2.2.4 RFID Tags Can Be Read at Greater Distances with a High-Gain Antenna
26.2.2.5 RFID Tags with Unique Serial Numbers Could Be Linked to an Individual Credit Card Number
26.2.3 Security Issues
26.3 Concerns about How RFID Will Be Used
26.4 Various Problematic Situations
26.5 Other Security Concerns
26.5.1 Viruses
26.5.2 Passports
26.6 Controversies
26.6.1 Privacy
26.6.2 Human Implantation
26.6.3 Religious Opinion
26.7 Protection against RFID Interception
26.8 RFID Shielding
26.9 Summary
References

26.1 Introduction

Radio frequency identification (RFID)1 chips are used everywhere. A number of examples can be quoted where RFID technology has been implemented—companies and laboratories use them as access keys, to start their cars, and as inventory tracking devices. Drug manufacturers rely on chips to track pharmaceuticals. In the near future, RFID tags are also about to get a lot more personal. Next generation U.S. passports and credit cards will contain RFIDs, and the medical industry is exploring the use of implantable chips to manage patients in an effective manner. According to the RFID market analysis firm IDTechEx, the push for digital inventory tracking and personal ID systems will expand the current annual market for RFIDs from $2.7 billion to as much as $26 billion by 2016 Shadow of RFID chip and antenna when held close to a lamp is shown in Figure 26.1.2
During World War II, the British placed radio transponders in Allied aircraft to help early radar system crews detect “good” guys from “bad” guys. The first chips were developed in research laboratories in the 1960s, and by the next decade the U.S. government was using tags to electronically authorize trucks coming into Los Alamos National Laboratory and other secure installations. Commercialized chips became widely manufactured and available in the 1980s, and RFID tags were used to track difficult-to-manage property like farm animals and railroad cars, and so on. But over the last few years, the market for RFIDs has exploded, driven by advances in computer databases and supported by declining chip prices. Now a number of companies, from Motorola to Philips to Texas Instruments, manufacture the chips.3
The tags work by broadcasting a few bits of information to specialized electronic readers. Most commercial RFID tags are passive emitters and have no onboard battery:4 these tags get activated by the reader power. Once activated, these chips broadcast their signal indiscriminately within a certain range, usually a few inches to a few feet. However, active RFID tags with internal power can send signals to hundreds of feet; these are deployed in the automatic toll-paying devices (with names like FasTrak and E-ZPass) that sit on car dashboards, pinging tollgates as autos whiz through.
For protection of information, RFID signals can be encrypted using suitable algorithms. The chips that are used for applications like passports, for example, will likely be coded/encrypted to make it difficult for unauthorized readers to retrieve their onboard information (which will include a person’s name, age, nationality, and photo and other sensitive information). But then, most of the commercial RFID tags do not include security as it is very expensive.
Images
FIGURE 26.1
Shadow of the RFID chip and antenna when held close to a lamp.
This leaves most RFIDs vulnerable to cloning and data tampering, if the RFID chip has a writable memory area. RFID chips that are used to track product shipments or expensive equipment, for example, often contain pricing and item information. These writable areas can be locked, but often they are ignored, either because the companies using RFIDs do not know the working of the chips, or the data fields need to be updated frequently. Either way, these chips are open to hacking or tampering of data.
The world of RFID is like the Internet in its early stages. No one had thought about building security features into the Internet in its early stages, and now we are paying for it in viruses and other attacks by adversaries. The same thing is also true of RFIDs (Figure 26.2).
Hacking of RFID chips is very easy. One can steal the smart card, lift someone’s passport, jack someone’s car, and even clone the chip embedded in an arm. There are so many accounts of how RFID has been hacked and one such case is shown in Figure 26.3.5,6
A wealthy software entrepreneur, James Van Bokkelen, was victimized by a hacker with a laptop. This was not an e-mail scam or bank account hack but something different. An adversary planned to use a cheap, homemade USB device to swipe the office key out of Van Bokkelen’s back pocket. He simply got his hand within a few inches of him. As Van Bokkelen approached from the parking lot, the adversary brushed past him. A coil of copper wire flashed briefly in the hacker’s palm, then disappeared.
The coil was an antenna for the wallet-sized device known as a cloner, which was concealed up his sleeve. This cloner can elicit, record, and mimic signals from smart card RFID chips. The hacker connected the device to his laptop with a USB cable and downloaded the data from Van Bokkelen’s card for processing. Then, once he retrieved the code, the hacker switched the cloner from Record mode to Emit. He headed toward the locked door and waved the cloner’s antenna in front of a black box attached to the wall. The single red LED blinked green. The lock clicked, and he walked in. Thus, we see how a robbery can be committed by exploiting the information present on an RFID chip. It was so simple and anybody could have very easily walked off with tens of thousands of dollars’ worth of computer equipment, and possibly source code worth even more.
Images
FIGURE 26.2
World’s first RFID chip infected with a virus.
Images
FIGURE 26.3
German hacker-cloned RFID e-passport. (From German Hacker Clone e-Passport, http://www.engadnet.com/2006/08/03/german-hackerscolone-rfid-e-passports/)
In a library, destroying the data on the books’ passive-emitting RFID tags is possible by wandering the aisles with an off-the-shelf RFID reader–writer and a laptop. These tags store several writable memory “pages” that store the books’ bar codes and loan status, and other information. The RFID-enabled checkout is indeed quite convenient. As the hacker leaves the library, he stops at a desk equipped with a monitor, and shows the books one at a time face up on a metal plate. The titles instantly appear on-screen. A person can borrow four books in less than a minute without bothering the librarian. In one case, a student took the books to his office, where he used a commercially available reader to scan the data from their RFID tags. The reader fed the data to his computer, which was running software that the student had ordered from RFID-maker, Tagsys. As he waved the reader over a book’s spine, ID numbers popped up on his monitor. He then found an empty page in the RFID’s memory and typed “AB.” When he scanned the book again, he saw the bar code with the letters “AB” next to it. This happened because of the Oakland library’s failure to lock the writable area. One could even erase the bar codes and then lock the tags. And then the library would have to replace the books.
On the other hand, unlocking the library’s tags makes it easier for libraries to change the data in future.
The Future Store in Rheinberg, Germany is the world’s preeminent test bed of RFID-based retail shopping. All the items in this high-tech supermarket have embedded RFID price tags, which allow the store and individual product manufacturers—for example, Gillette, Kraft, and Procter & Gamble—to gather near real-time feedback on what is bought. In July 2004, Wired hailed the store as the “supermarket of the future.” A few months later, German security expert Lukas Grunwald hacked the chips and showed the vulnerability of RFID chips.
Grunwald co-wrote a program called RFDump, which allows access and alters price chips using a PDA (with an RFID reader) and a PC card antenna. With the permission of the store owner, he and his colleagues strolled the aisles, downloading information from hundreds of sensors. They demonstrated how easily they could upload data from one chip onto another. He also showed how he could download the price of a cheap wine into RFDump and then cut and paste it onto ...

Table of contents

  1. Cover Page
  2. Title Page
  3. Copy Page
  4. Contents
  5. preface
  6. Editors
  7. Contributors
  8. Section I Introduction
  9. Section II Technology
  10. Section III Applications
  11. Section IV Security and Privacy
  12. Index