SlideShare a Scribd company logo
1 of 1
Download to read offline
RFID and Security Vulnerabilities
Aaron Britton, David Cole, Zachary Farr, Travis Waltrip, Michael Brockly, Stephen Elliott
The purpose of this project was to research the security vulnerabilities of RFID, ways to guard against those
vulnerabilities, and how the security solutions impact business processes. With the recent increase in use of
RFID technologies, businesses need to be aware of the security threats and associated risks.
RFID Cloning
Overview
RFID Denial of Service
RFID Eavesdropping and Skimming
Prevention
http://www.t4f.org/archives/OpenRFIDTagLite/schematics/OpenRFIDTagLiteversion03.pdf
A method of capturing data from an RFID tag and then creating an
unauthorized copy of the captured data onto a new chip.
Access control cards are very easily cloned. Tech for Fun published
schematics and firmware for a hardware cloner.
Physically Unclonable Functions – Circuit based challenge and response mechanism that
forces each RFID chip to provide a unique response.
Public Key Cryptography – Using a key to encrypt the plaintext and then a separate key
to decrypt the data.
Reduce Range – Lower the threshold on how far cards can be read
Semi-Randomized Control – Type of Encryption in which readers need multiple modes to
gain access of the information
Faraday Cage - A Faraday cage is a metallic enclosure that prevents the entry or escape
of an electromagnetic field. Can be used in large or small environments
Injection is malicious or harmful code inserted into an RFID tag that is used to alter or corrupt
data in a radio frequency identification system.
Code Injection – Uses scripting languages (php, xml or sql)
Examples: ;shutdown or ;drop table <tablename>
Airport Scenario:
• Infected luggage with an RFID tag is checked in at an airport.
• Luggage is scanned at the check-in counter and the data is processed.
• The payload is then released into the system and executed.
• Comprised data is now moving throughout the system and can be released onto new tags.
Abawajy, J., Fernando, Harinda.:Securing RFID Systems from SQLIA.
RFID Virus Injection
An unauthorized access of information from the victims RFID information.
• Eavesdropping – Unauthorized access of information from the transaction between the
Reader and token
• Attack Types - Personal Debit/Credit Cards, Industrial Inventory, Personal
Information
• Example - Perpetrator “listens” to information being transmitted from a
contactless debit card to retailers point of sale
• Type of Equipment Used - Antenna, Amplifier, Mixer, Oscillator
Hancke, Gerhard. "Practical eavesdropping and skimming attacks
." Journal of Computer Security . 2011.19 (2011): 259-288. Print.
A denial of service attack prevents or damages the availability or usability of the RFID
system.
Blocker Tags - RFID tag that can simulate a multitude of legitimate tags
• Tag simulates both a 0 and a 1 when read.
• 0 and 1 simulation is an error to reader and forces the reader to try and read the entire
binary tree.
• As entire binary tree is very large, the reader will timeout before completion.
Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy.
RFID Retail
• A thief enters a store and removes the RFID tag from a product.
• Can place onto another product to reduce price.
• Thief can steal item since RFID tag was removed.
• Faraday cage used to prevent an RFID tag from being scanned.
Loss prevention - Retail must maintain traditional loss prevention methods to prevent
faraday cage thefts.
Attach RFID to products in such a way that removal damages product.
Use an observer with automated systems to ensure that products are not switched.
Detect blocker tag attack when an unreasonable number of RFID tags is detected at a
location.
Use limited size tags such as the EPC tag that has a limited size of 96 bits.
Conduct independent code audits of the middleware that’s used in conjunction with the
tag readers.
• Skimming – A direct attack on the victims token in which
information is received without consent
• Attack Types – Passports, Secure Access
Passes , Personal Information
• Perpetrator “pings” a victims RFID token, using
both a “power source” and receiver.
• Type of Equipment Used – Coil Antenna, RF
Antenna, Power Amplifier, RFID receiver

More Related Content

What's hot

15220680 pss7-ans
15220680 pss7-ans15220680 pss7-ans
15220680 pss7-anscandyk35
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Mohammad Affan
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)Akash Karwande
 
Final presentationmlis7505
Final presentationmlis7505Final presentationmlis7505
Final presentationmlis7505Stephanie
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passportsRiscure
 
Proprietary Information
Proprietary InformationProprietary Information
Proprietary Informationhypknight
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTponraj leo
 
11010673 pt8
11010673 pt811010673 pt8
11010673 pt8lkk1368
 
Tablet slate pc
Tablet slate pcTablet slate pc
Tablet slate pcvivi_hing
 
11123456 pt8
11123456 pt811123456 pt8
11123456 pt8kmlam
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyDavid Rogers
 
11003677 pt8
11003677 pt811003677 pt8
11003677 pt8sinpaak
 
Radio frequency identification_najmul hoque munshi
Radio frequency identification_najmul hoque munshiRadio frequency identification_najmul hoque munshi
Radio frequency identification_najmul hoque munshiNajmulHoqueMunshi
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Galuh Yudha Mahardika
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationvianchow
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationngjklmn
 

What's hot (20)

15220680 pss7-ans
15220680 pss7-ans15220680 pss7-ans
15220680 pss7-ans
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 
Firewall
FirewallFirewall
Firewall
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 
Final presentationmlis7505
Final presentationmlis7505Final presentationmlis7505
Final presentationmlis7505
 
11014059 pt8
11014059 pt811014059 pt8
11014059 pt8
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passports
 
Proprietary Information
Proprietary InformationProprietary Information
Proprietary Information
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
 
Project5
Project5Project5
Project5
 
11010673 pt8
11010673 pt811010673 pt8
11010673 pt8
 
Tablet slate pc
Tablet slate pcTablet slate pc
Tablet slate pc
 
11123456 pt8
11123456 pt811123456 pt8
11123456 pt8
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 
11003677 pt8
11003677 pt811003677 pt8
11003677 pt8
 
Radio frequency identification_najmul hoque munshi
Radio frequency identification_najmul hoque munshiRadio frequency identification_najmul hoque munshi
Radio frequency identification_najmul hoque munshi
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 

Similar to (Spring 2012) RFID and Security Vulnerabilities

Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid applicationPriyanka Singh
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacyShahryar Ali
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxKondiVinay
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
RFID-SECURITY_Vatsalya
RFID-SECURITY_VatsalyaRFID-SECURITY_Vatsalya
RFID-SECURITY_VatsalyaVatsalya Eranky
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technologyAbdullah Khosa
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002 Akash Maurya
 
Rfid security access control system
Rfid security access control systemRfid security access control system
Rfid security access control systemEdgefxkits & Solutions
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid PrimerSpaceCycles, LLP
 
rfid presentation
rfid presentationrfid presentation
rfid presentationDinesh Nikam
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 

Similar to (Spring 2012) RFID and Security Vulnerabilities (20)

Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
sdr using rfid application
sdr using rfid applicationsdr using rfid application
sdr using rfid application
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
 
RFID and its Applications
RFID and its ApplicationsRFID and its Applications
RFID and its Applications
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
RFID-SECURITY_Vatsalya
RFID-SECURITY_VatsalyaRFID-SECURITY_Vatsalya
RFID-SECURITY_Vatsalya
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technology
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
 
Rfid security access control system
Rfid security access control systemRfid security access control system
Rfid security access control system
 
Rfid complete
Rfid completeRfid complete
Rfid complete
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 

More from International Center for Biometric Research

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...International Center for Biometric Research
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 

More from International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

(Spring 2012) RFID and Security Vulnerabilities

  • 1. RFID and Security Vulnerabilities Aaron Britton, David Cole, Zachary Farr, Travis Waltrip, Michael Brockly, Stephen Elliott The purpose of this project was to research the security vulnerabilities of RFID, ways to guard against those vulnerabilities, and how the security solutions impact business processes. With the recent increase in use of RFID technologies, businesses need to be aware of the security threats and associated risks. RFID Cloning Overview RFID Denial of Service RFID Eavesdropping and Skimming Prevention http://www.t4f.org/archives/OpenRFIDTagLite/schematics/OpenRFIDTagLiteversion03.pdf A method of capturing data from an RFID tag and then creating an unauthorized copy of the captured data onto a new chip. Access control cards are very easily cloned. Tech for Fun published schematics and firmware for a hardware cloner. Physically Unclonable Functions – Circuit based challenge and response mechanism that forces each RFID chip to provide a unique response. Public Key Cryptography – Using a key to encrypt the plaintext and then a separate key to decrypt the data. Reduce Range – Lower the threshold on how far cards can be read Semi-Randomized Control – Type of Encryption in which readers need multiple modes to gain access of the information Faraday Cage - A Faraday cage is a metallic enclosure that prevents the entry or escape of an electromagnetic field. Can be used in large or small environments Injection is malicious or harmful code inserted into an RFID tag that is used to alter or corrupt data in a radio frequency identification system. Code Injection – Uses scripting languages (php, xml or sql) Examples: ;shutdown or ;drop table <tablename> Airport Scenario: • Infected luggage with an RFID tag is checked in at an airport. • Luggage is scanned at the check-in counter and the data is processed. • The payload is then released into the system and executed. • Comprised data is now moving throughout the system and can be released onto new tags. Abawajy, J., Fernando, Harinda.:Securing RFID Systems from SQLIA. RFID Virus Injection An unauthorized access of information from the victims RFID information. • Eavesdropping – Unauthorized access of information from the transaction between the Reader and token • Attack Types - Personal Debit/Credit Cards, Industrial Inventory, Personal Information • Example - Perpetrator “listens” to information being transmitted from a contactless debit card to retailers point of sale • Type of Equipment Used - Antenna, Amplifier, Mixer, Oscillator Hancke, Gerhard. "Practical eavesdropping and skimming attacks ." Journal of Computer Security . 2011.19 (2011): 259-288. Print. A denial of service attack prevents or damages the availability or usability of the RFID system. Blocker Tags - RFID tag that can simulate a multitude of legitimate tags • Tag simulates both a 0 and a 1 when read. • 0 and 1 simulation is an error to reader and forces the reader to try and read the entire binary tree. • As entire binary tree is very large, the reader will timeout before completion. Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. RFID Retail • A thief enters a store and removes the RFID tag from a product. • Can place onto another product to reduce price. • Thief can steal item since RFID tag was removed. • Faraday cage used to prevent an RFID tag from being scanned. Loss prevention - Retail must maintain traditional loss prevention methods to prevent faraday cage thefts. Attach RFID to products in such a way that removal damages product. Use an observer with automated systems to ensure that products are not switched. Detect blocker tag attack when an unreasonable number of RFID tags is detected at a location. Use limited size tags such as the EPC tag that has a limited size of 96 bits. Conduct independent code audits of the middleware that’s used in conjunction with the tag readers. • Skimming – A direct attack on the victims token in which information is received without consent • Attack Types – Passports, Secure Access Passes , Personal Information • Perpetrator “pings” a victims RFID token, using both a “power source” and receiver. • Type of Equipment Used – Coil Antenna, RF Antenna, Power Amplifier, RFID receiver