Download RFID Technology: Understanding the Future of Contactless Identification and more Study notes School management&administration in PDF only on Docsity! 1 RF ID EJ Jung 12/07/06 What is RFID? Radio-Frequency Identification Tag Chip Antenna 2 How Does RFID Work? Tags (transponders) Attached to objects, “call out” identifying data on a special radio frequency 02.3DFEX4.78AF51 EasyToll card #816 Reader (transceiver) Reads data off the tags without direct contact Radio signal (contactless) Range: from 3-5 inches to 3 yards Database Matches tag IDs to physical objects RFID is the Barcode of the Future Barcode RFID Line-of-sight reading • Reader must be looking at the barcode Specifies object type • E.g., “I am a pack of Juicy Fruit” Reading by radio contact • Reader can be anywhere within range Specifies unique object id • E.g., “I am a pack of Juicy Fruit #86715-A” Fast, automated scanning (object doesn’t have to leave pocket, shelf or container) Can look up this object in the database 5 Risks Personal privacy • FDA recommended tagging drugs with RFID “pedigrees”; ECB planned to add RFID tags to euro banknotes… – I’ll furtively scan your briefcase and learn how much cash you are carrying and which prescription medications you are taking Skimming: read your tag and make my own • In February 2005, JHU-RSA Labs team skimmed and cloned Texas Instruments’ RFID device used in car anti- theft protection and SpeedPass gas station tokens Corporate espionage • Track your competitor’s inventory RFID Tag Power Sources Passive (this is what mostly used now) • Tags are inactive until the reader’s interrogation signal “wakes” them up • Cheap, but short range only Semi-passive • On-board battery, but cannot initiate communication – Can serve as sensors, collect information from environment: for example, “smart dust” for military applications • More expensive, longer range Active • On-board battery, can initiate communication 6 RFID Capabilities No or very limited power Little memory • Static 64- or 128-bit identifier in current 5-cent tags Little computational power • A few thousand gates at most • Static keys for read/write access control Not enough resources to support public- or symmetric-key cryptography • Cannot support modular arithmetic (RSA, DSS), elliptic curves, DES, AES; hash functions are barely feasible – Recent progress on putting AES on RFID tags Blocking Unwanted Scanning Kill tag after purchase • Special command permanently de-activates tag after the product is purchased • Disables many futuristic applications Faraday cage • Container made of foil or metal mesh, impenetrable by radio signals of certain frequencies – Shoplifters are already known to use foil-lined bags • Maybe works for a wallet, but huge hassle in general Active jamming • Disables all RFID, including legitimate applications