1 / 11

Analysis of RFID Architecture and Security

Analysis of RFID Architecture and Security. CMPE 294 Final Presentation Presented by Sundeep Kotla. RFID – Radio frequency Identification. RFID was first used during the world war II . It was used to identify whether the plane was from a friend or a foe. RIFD Components. RFID Tags

ilori
Download Presentation

Analysis of RFID Architecture and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Analysis of RFID Architecture and Security CMPE 294 Final Presentation Presented by Sundeep Kotla

  2. RFID – Radio frequency Identification. RFID was first used during the world war II . It was used to identify whether the plane was from a friend or a foe.

  3. RIFD Components • RFID Tags • RIFD Reader • RFID MIDDLE Ware • RFID Data Base

  4. RFID Middle Ware RFID Tags /Reader Server 1 Server 2 Read Surrogate Server 3 Server 4 Aggregation Virtual Tag memory service Application 3 Application 2 Application 1 Messaging Server Server 5 Buffering Aggregation Reader 1 Aggregation Reader 2 Reader 3 Antenna Filtering Filtering Filtering Tags RFID Middle ware

  5. RFID Design issues • No power in RFID tags • Proprietary based Encryption NO Power

  6. RFID Attacks • RFID Tags / Reader • Tracking - I CAN TRACK YOUUUU • Skimming • Eavesdropping • Replay – I AM BOB – I SWEAR • Replay and cross contamination • Disruption attack PARTIAL SOLUTION : content based filtering

  7. RFID Middle ware attacks • Sql injection attacks • Query:"Find luggage for Mr.Sinn; shutdown” • Response:“5 bags to washington; database shutdown completed“. • Solution :Light weight Encryption

  8. RFID Back end attacks • Data attacks • Flooding the data base with large mounts of data • Virus attacks • Web component Exploitation • example [s1] <!--#exec cmd="rm -R /"--> Delete files from the database !!!! Solution To have application level gate way

  9. Conclusion • RFID is a promising technology . • Considerable work is being done on scalable middleware architecture • Security of RFID is also being worked on with the work on Light DES Future of E Business • IBM store

  10. REFERENCES • Anand M.Das, Anita Campbell, Brad Haines, Hersh Bhargava, & Pete Lindstrom (2006). • RFID Security. Washington, DC • Mikey Sklar. (2006). RFID Exposed: The Naked Truth about the Future of Retail [Digital Journal]. • Privacy and Security in library RFID. (n.d.). Retrieved December 1, 2007, from http://www.cs.berkeley.edu/~dmolnar/library.pdf • Review of DES and current status. (n.d). Retrieved Dec 1, 2007, from • http://www.distributed.net/DES

  11. Any Questions

More Related