RFID Security By Mike Weldon
Overview <ul><li>Concerns </li></ul><ul><li>Methods of protection </li></ul>
RFID Security Concerns <ul><li>Privacy </li></ul><ul><li>Product Information </li></ul><ul><li>Shipping Information </li><...
Methods of Protection <ul><li>Kill Codes </li></ul><ul><li>Insubvertible Encryption </li></ul><ul><li>Selective  Blocking ...
Kill Codes <ul><li>A kill code is a special pin-code that can disable the RFID chip. </li></ul>
Insubvertible Encryption <ul><li>Requirements: Re-writeable RFID Tags </li></ul><ul><li>Certifications of authorization an...
Selective  Blocking <ul><li>Specialized RFID tag </li></ul><ul><li>Requires an authorization code </li></ul><ul><li>Spammi...
Distance Measurement <ul><li>Signal-to-noise measurement </li></ul><ul><li>Distance implies trust </li></ul>
Primary Sources <ul><li>http://www.rsa.com/rsalabs/node.asp?id=2119 </li></ul><ul><li>http://en.wikipedia.org/wiki/RFID#Se...
Questions <ul><li>Which of the following is  not  a security prevention method? </li></ul><ul><ul><li>Distance Measurement...
Upcoming SlideShare
Loading in …5
×

Security

357 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
357
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Privacy – Obviously the biggest concern and a big topic today with the new passports. What happens if someone reads my stuff and blah… the chips in humans can contain allergies and medical information, what if someone reads this and uses it against the person or figures out a way to change it? Product Information – On one of the articles I read a concern was of people finding ways to change the product information if they go to RFID tags which could mess everything up entirely Shipping Information – same as before, what if someone finds a way to change this information to a different location, different products or anything else.
  • The device reading the RFID requires a special certification inorder to read it, but if you can get past that, the way the data is stored on the RFID tag is randomized every time differently and only the program knows how to decrypt it through special algorithms. Still in development stages.
  • Security

    1. 1. RFID Security By Mike Weldon
    2. 2. Overview <ul><li>Concerns </li></ul><ul><li>Methods of protection </li></ul>
    3. 3. RFID Security Concerns <ul><li>Privacy </li></ul><ul><li>Product Information </li></ul><ul><li>Shipping Information </li></ul>
    4. 4. Methods of Protection <ul><li>Kill Codes </li></ul><ul><li>Insubvertible Encryption </li></ul><ul><li>Selective Blocking </li></ul><ul><li>Distance Measurement </li></ul>
    5. 5. Kill Codes <ul><li>A kill code is a special pin-code that can disable the RFID chip. </li></ul>
    6. 6. Insubvertible Encryption <ul><li>Requirements: Re-writeable RFID Tags </li></ul><ul><li>Certifications of authorization and randomized encryption </li></ul>
    7. 7. Selective Blocking <ul><li>Specialized RFID tag </li></ul><ul><li>Requires an authorization code </li></ul><ul><li>Spamming tag (simulates all frequencies) </li></ul><ul><li>Reusability </li></ul>
    8. 8. Distance Measurement <ul><li>Signal-to-noise measurement </li></ul><ul><li>Distance implies trust </li></ul>
    9. 9. Primary Sources <ul><li>http://www.rsa.com/rsalabs/node.asp?id=2119 </li></ul><ul><li>http://en.wikipedia.org/wiki/RFID#Security_concerns </li></ul><ul><li>http://portal.acm.org : </li></ul><ul><li>Untraceable RFID Tags via Insubvertible Encryption The Blocker Tag: </li></ul><ul><li>Selective Blocking of RFID Tags for Consumer Privacy </li></ul><ul><li>Untraceable RFID Tags via Insubvertible Encryption </li></ul>
    10. 10. Questions <ul><li>Which of the following is not a security prevention method? </li></ul><ul><ul><li>Distance Measurement </li></ul></ul><ul><ul><li>Tag Cloaking </li></ul></ul><ul><ul><li>Kill Codes </li></ul></ul><ul><ul><li>Selective Blocking </li></ul></ul><ul><li>How do RFID Kill Codes work? </li></ul><ul><li>What are retailers afraid of in regards to RFID security? </li></ul>

    ×