Radio Frequency Identification (RFID) Security issues and possible solutions

Radio Frequency Identification (RFID) Security issues and possible solutions

ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 3, September 2013
341
Abstract— Radio-frequency identification (RFID) has become
popular for automated identification and tracking of objects,
goods and people. As the applications of RFID are expanding
every day, new security issues also will be appeared. This paper
speaks about fundamentals of RFID systems and security issues
which can be raised in each one of the RFID architecture parts, as
a wireless communication technology. This paper emphasize on
the requirement of security in each special type of RFID systems
applications, different kind of treats which can influence the
security and safety of the RFID applicants and the last
improvements of existing security and privacy methods and
protocols.
Index Terms— Reader, RFID, Security, Tag.
I. INTRODUCTION
Radio-frequency identification (RFID) is an automatic
identification and data capturing technology, which can be
used in different fields in order to identify and track goods and
people. The history of RFID returns to around 70 years back
in Second World War which RFID was used to identify
enemy aircraft. However, today’s RFID applications are
somehow different with its initial applications. Undoubtedly
new applications of RFID have made a revolution in
inventory and automation processes; RFID can be seen
everywhere from supply chain inventory to animal
identification, from health care management to RFID enable
passports or in a supermarket like a barcode for goods.
A. RFID Fundamental
RFID system has at least a tag and a reader. A tag consists
of a microchip, capacitors and an antenna coil. A tag
communicates with an RFID reader through radio signals.
RFID reader is used in order to do the tag inquiries and grasp
the needed information from the tag. The reader sends out
some radio waves to interrogate the tag. [1] These radio
waves are emitted by reader’s antenna then RFID tag replies
the radio waves while in the other side the reader is connected
to a backend database which processes the information’s sent
by the tag. RFID tag's microchip saves the information that
are important like product code, id number or any information
which must be retrieved by the reader. RFID tags are two
general types: passive and active.
 Passive tags: this type of tags does not need battery to
work. They generate power from a signal of an outer reader.
The passive tags reflect the radio frequency signal transmitted
to them from a reader then add information by modulating the
reflected signal, and obtain power from the signal of an
external reader. The most known application of passive tags is
to replace the customary barcode technology (with some
important advantages in compare to barcode) and has much
lighter weight and chipper price in compare with active tag,
and also virtually its effective lifetime is infinite .nevertheless
on the other side, read ranges of passive tags is very limited.
[2]
 Active tags: are battery-powered tags (usually on-board
battery) and so having more transmission range and stronger
signal in compare with the passive tags. That is why the
readers can touch them from longer distance. [3]The onboard
power supply increases the size and price of the active tags so
active tags are larger and more expensive than the passive
tags, thus large items tracked over long distance are the best
operational platform for active tags. In comparison of two
tags, it is obvious that passive tags are very inexpensive.
Today each piece of passive tags is around 20 cents which
seems a reasonable price to integrate into common materials
and products, although technology is trying to make them
chipper. Furthermore, passive tags size can also be quite
small. By the new technology findings, about the tags antenna
the size of new passive tags limits to about the size of a
quarter. [2]
Fig 1- RFID Components [10]
II. RFID SECURITY ISSUES
Although the contactless nature of RFID and its fast speed
in affording the information grants a big superiority over
known machine-readable identification method’s, some types
of vulnerabilities are there in RFID systems which make them
permeable to a wide range of attacks. Generally, RFID
security issue and possible attacks can be divided in three
major categories:
 Attacks which affect RFID edge hardware part
 Attacks which affect the communication part
 Attacks which affect the data support part
Radio Frequency Identification (RFID) security
issues and possible solutions
Mohsen Khosravi, Ahmad Sharifi, Dr. Asadullah Shah
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 3, September 2013
342
B. RFID Edge hardware
It consists of RFID physical and touchable devices. In
RFID systems two major physical devices are available “tag
and reader”. Tampering vulnerability can be seen in these
devices due to common security weakness in these devices.
[3].
C. Communication part
Information swapping is the major duty of the
communication part. Most of the attacks in this part, are
pointed to radio link. If the attacker can listen in, it can be ease
to modify or jam the signal. The third part of RFID system is
data support part, which connects the RFID reader to database
and is vulnerable for different types of attacks. In each one of
three parts of an RFID system attackers try to break one of this
three security properties:
 Confidentiality
 integrity
 Availability
Confidentiality guaranties that unauthorized hands cannot
access the important information or services. Integrity ensures
that information or services are not touched, altered or
modified by unauthorized hands. Availability guaranties that
information and/or services should be always attainable to all
rightful hands. [4]According to the three general security
properties in RFID systems, possible attacks can be divided in
six general types:
 spoofing identity
 tempering with data
 Repudiation
 information exposure
 denial of service
 looming of privilege
[5] Spoofing occurs when an attacker successfully puts on
as an authorized user of a system and so, for example can
perform an inventory of a store without any authorization
through the scanning the EPC tags. When the attacker
modifies, adds, deletes, or reorders the data, tempering attack
occurs. For example modification of the tag on the passport
while, modifies EPC number on tags in the shopping mall,
kills or erases a tag in supply chain. Repudiation occurs when
a user denies an action and no proof exist to prove that the
action was performed, for example a retailer denies receiving
a certain pallet, case or item or in other example the owner of
the EPC number denies having information about the item to
which the tag is attacked. Information exposure happens when
the information is manifested to an unauthorized user i.e., a
smart bomb placed at a street corner detonates in the time that
a specific person with an RFID-enable passport discovered.
Denial of service occurs when the system denies service to a
valid user and for performing this attack, a tag can be killed,
blocked to shoplifter can take the stolen item out of the shop
or removed and maybe physically destroyed. Looming of
privilege occurs when an unprivileged user or attacker gains
higher privilege in the system than what they are empowered
for example attacker can write or add malicious data in to the
system as an administrator. [6]
Fig 2- Communication
III. POSSIBLE SOLUTIONS
In the previous section, shows several types of attack are
possible to occur in RFID systems. In this section, the most
known security solutions proposed ever will be explained. [7]
 Killing the tag:
The first and easiest solution, when a tag is in the treat is to
kill the tag. Each tag has a unique password, which has
programed in the production time. Once the right password
entered, the tag will be deactivated evermore.
 The solid cage method:
In this method, tag will be isolated from any
electromagnetic waves. This can be gained by using a
container made of metal mesh or foil that is impermeable by
radio signals.
 Blocking a tag:
If more than one tags respond an inquiry sent by a reader, it
figures out a collision, this method is used in the protocols like
ALOHA and tree-walking protocols. [3]
 Classic cryptographic methods:
Cryptography algorithms and methods examples are
rewritable memory, symmetric key encryption and public key
encryption, which are used to keep the system secure. [7]
 Using hash function:
One of the most proposed methods for preserving the RFID
system security is to use the hash function schemes like hash
lock scheme, randomized hash lock scheme and hash chain
scheme. [8]In addition to the named methods for maintaining
RFID systems security and privacy some types of protocols
like PRF private authentication scheme, tree-based private
authentication, delegation tree, human protocols are
proposed. [9]
IV. CONCLUSION
Although, today the RFID technology can be seen
everywhere with different types of applications, but there are
ISSN: 2277-3754
ISO 9001:2008 Certified
International Journal of Engineering and Innovative Technology (IJEIT)
Volume 3, Issue 3, September 2013
343
drawbacks and security issues yet that technology has not
find perfect solutions for them this security issues make the
society unwilling to accept the RFID systems with open arms
in the case of sensitive applications like banking card. So if
security and privacy problems be solved completely then the
technology can guaranty the safety of the applicants curtail
information which will lead to raise of the users satisfactory
and of course more RFID universalization.
REFERENCES
[1] Knospe, H. and H. Pohl, RFID security. Information Security
Technical Report, 2004. 9(4): p. 39-50.
[2] LIU, L.M.N.a.Y., LANDMARKING: Indoor location Sensing
Using Active RFID. Kluwer Academic Publisher.
manufactured in nwtherlands, 2004. 10: p. 10.
[3] Weinstein, R., RFID: a technical overview and its application
to the enterprise. IT professional, 2005. 7(3): p. 27-33.
[4] Mitrokotsa, A., M. Beye, and P. Peris-Lopez, Classification of
RFID Threats based on Security Principles.
[5] Thompson, T., D.R., N. Chaudhry, and C.W. Thompson. RFID
security threat model. in Conf. on Applied Research in
Information Technology. 2006.
[6] Duc, D.N., et al. Open issues in RFID security. in Internet
Technology and Secured Transactions, 2009. ICITST 2009.
International Conference for. 2009. IEEE.
[7] Pedro Peris-Lopez, J.C.H.-C., Juan M. Estevez-Tapiador, and
Arturo Ribagorda, RFID SYSTEMS: A Survey on Security
Thereats and Proposed Solutions. p. cuenca nad l. orozco-
barbosa (Eds): PWC 2006, LNCS 4217, pp. 159-170, 2006
[8] Li, Y.Z., et al. Security and privacy on authentication protocol
for low-cost RFID. in Computational Intelligence and Security,
2006 International Conference on. 2006. IEEE.
[9] IFIP international federation for information processing 2006,
2006: p. 159-170.
[10] www.digitivity.com
AUTHOR’S PROFILE
Mohsen Khosravi. He is PhD student in the Information Technology
department of Information and Communication Technology (KICT) of
International Islamic University Malaysia (IIUM). He has received his
master of Information Technology from Jawaharlal Nehru Technological
University (JNTU), Hyderabad, India. His bachelor is software engineering
from Azad university of Lahijan, Iran. His fields of interests are ADHOC,
WSN and RFID that he works on it specially.
Ahmad Sharifi. He has received M.Tech in Computer Networks and
Information Security from Jawaharlal Nehru Technological University
(JNTU), Hyderabad, India. In addition, he has received his bachelor in
Electronic engineering from industrial university of Shahroud, Iran. Ahmad
has professional experiences on technical engineering on ISP and network
designs for many years. In addition, he is involving with teaching in
universities. He interests in Cryptography, WSN, ADHOC, MATLAB,
OPNET and other related issues. His personal website is
www.ahmadsharifi.com. Furthermore, he cooperates with RIPE NCC
www.ripe.net via www.sharifisp.com that is Internet Service Provider.
PROF. DR. ASADULAH SHAH.
He is Professor at Department of Computer Science, Kulliyyah of
Information and Communication Technology, IIU Malaysia. Dr. Shah has a
total of 24 years teaching and research experience. He has 60 research
publications in International and national journals and conference
proceedings. Dr. Shah has done his undergraduate degree in Electronics,
Master’s degree in Computer Technology from the University of Sindh, and
PhD in Multimedia Communication, from the University of Surrey,
England, UK. His areas of interest are multimedia compression techniques,
research methodologies, speech packetization and statistical
multiplexing. He has been teaching courses in the fields of electronics,
computers, telecommunications and management sciences.

Recomendados

Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module por
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
341 vistas5 diapositivas
Ijarcet vol-2-issue-3-867-869 por
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
172 vistas3 diapositivas
RFID Privacy & Security Issues por
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
17.1K vistas40 diapositivas
Rfid security workshop v0.9 -nahuel_grisolia por
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
8.5K vistas101 diapositivas
RFID based tracking System por
RFID based tracking SystemRFID based tracking System
RFID based tracking SystemShahrikh Khan
1.7K vistas27 diapositivas
RFID security ppt por
RFID security pptRFID security ppt
RFID security pptSandeep Singh
10.4K vistas14 diapositivas

Más contenido relacionado

La actualidad más candente

Security access control system using rfid por
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfidEcwayt
1.2K vistas2 diapositivas
Rfid presentation por
Rfid presentationRfid presentation
Rfid presentationKalpna Saharan
35.6K vistas28 diapositivas
RFID AND LIBRARIES por
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIESSheel Bhadra Yadav
126 vistas33 diapositivas
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin... por
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
316 vistas10 diapositivas
11. rfid security using mini des algorithm in deployment of bike renting system por
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
335 vistas11 diapositivas
Ioe module 2 por
Ioe module 2Ioe module 2
Ioe module 2nikshaikh786
448 vistas39 diapositivas

La actualidad más candente(19)

Security access control system using rfid por Ecwayt
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfid
Ecwayt1.2K vistas
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin... por Alexander Decker
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker316 vistas
11. rfid security using mini des algorithm in deployment of bike renting system por Alexander Decker
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
Alexander Decker335 vistas
Rfid presentation por ashish pal
Rfid presentationRfid presentation
Rfid presentation
ashish pal439 vistas
A Security Framework in RFID por ijtsrd
A Security Framework in RFIDA Security Framework in RFID
A Security Framework in RFID
ijtsrd60 vistas
RFID Based Security and Access Control System using ARDUINO por IJMTST Journal
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
IJMTST Journal155 vistas
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT por ponraj leo
RFID TECHNOLOGIES AND ITS APPLICATION ON IOTRFID TECHNOLOGIES AND ITS APPLICATION ON IOT
RFID TECHNOLOGIES AND ITS APPLICATION ON IOT
ponraj leo752 vistas
RFID por dont
RFIDRFID
RFID
dont1.7K vistas

Destacado

Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti por
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle retiIl Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle retiProvincia Di Teramo
1.2K vistas37 diapositivas
Survey of universal authentication protocol for mobile communication por
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communicationAhmad Sharifi
388 vistas5 diapositivas
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security... por
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...Ahmad Sharifi
549 vistas6 diapositivas
Survey of the end to end secure communication in ADHOC networks por
Survey of the end to end secure communication in ADHOC networksSurvey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networksAhmad Sharifi
334 vistas5 diapositivas
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez por
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF SuezIl Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF SuezProvincia Di Teramo
1.2K vistas36 diapositivas
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s... por
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...Provincia Di Teramo
1.2K vistas33 diapositivas

Destacado(19)

Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti por Provincia Di Teramo
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle retiIl Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Il Patto che illumina l'Abruzzo - Marco Santarelli - Polo analisi delle reti
Provincia Di Teramo1.2K vistas
Survey of universal authentication protocol for mobile communication por Ahmad Sharifi
Survey of universal authentication protocol for mobile communicationSurvey of universal authentication protocol for mobile communication
Survey of universal authentication protocol for mobile communication
Ahmad Sharifi388 vistas
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security... por Ahmad Sharifi
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
Ahmad Sharifi549 vistas
Survey of the end to end secure communication in ADHOC networks por Ahmad Sharifi
Survey of the end to end secure communication in ADHOC networksSurvey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networks
Ahmad Sharifi334 vistas
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez por Provincia Di Teramo
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF SuezIl Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Il Patto che illumina l'Abruzzo - Comune di Manfredonia - Cofely GDF Suez
Provincia Di Teramo1.2K vistas
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s... por Provincia Di Teramo
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Il Patto che illumina l'Abruzzo - Luciana Mastrolonardo - Dal dire al fare: s...
Provincia Di Teramo1.2K vistas
Le procedura elettorale per le elezioni di secondo livello nelle Province abr... por Provincia Di Teramo
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
Le procedura elettorale per le elezioni di secondo livello nelle Province abr...
Provincia Di Teramo737 vistas
Deal with attacks over cognitive radio networks authenticationognitive radio por Ahmad Sharifi
Deal with attacks over cognitive radio networks authenticationognitive radioDeal with attacks over cognitive radio networks authenticationognitive radio
Deal with attacks over cognitive radio networks authenticationognitive radio
Ahmad Sharifi197 vistas
GSM Technology and security impact por Ahmad Sharifi
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
Ahmad Sharifi326 vistas
Secured-Bandwidth Reservation Distance Vector routing Protocol por Ahmad Sharifi
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing Protocol
Ahmad Sharifi223 vistas
Security Attacks And Solutions On Ubiquitous Computing Networks por Ahmad Sharifi
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
Ahmad Sharifi567 vistas
202020+ La crescita sostenibile in Comune con TE por Provincia Di Teramo
202020+ La crescita sostenibile in Comune con TE202020+ La crescita sostenibile in Comune con TE
202020+ La crescita sostenibile in Comune con TE
Provincia Di Teramo1.3K vistas
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà por Provincia Di Teramo
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verràIl Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
Il Patto che illumina l'Abruzzo - Chiara Tonelli - La Casa che verrà
Provincia Di Teramo407 vistas
Progetto di ricerca rischio idrogeologico e sismico por Provincia Di Teramo
Progetto di ricerca rischio idrogeologico e sismicoProgetto di ricerca rischio idrogeologico e sismico
Progetto di ricerca rischio idrogeologico e sismico
Provincia Di Teramo883 vistas
Reto de La Conectividad por NatyLiza
Reto de La ConectividadReto de La Conectividad
Reto de La Conectividad
NatyLiza74 vistas

Similar a Radio Frequency Identification (RFID) Security issues and possible solutions

A Survey Of RFID Authentication Protocols Based On Hash-Chain Method por
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
3 vistas6 diapositivas
Rfid3 por
Rfid3Rfid3
Rfid3kunal13309
83 vistas15 diapositivas
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A... por
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...IJNSA Journal
39 vistas20 diapositivas
Internet of Things and its Enabling Technologies - RFID por
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
7.1K vistas15 diapositivas
Implementation of radio frequency identification technology in accessing info... por
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...eSAT Journals
217 vistas10 diapositivas
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf por
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfRadio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfManju Badiger
57 vistas5 diapositivas

Similar a Radio Frequency Identification (RFID) Security issues and possible solutions(20)

A Survey Of RFID Authentication Protocols Based On Hash-Chain Method por Luz Martinez
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
Luz Martinez3 vistas
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A... por IJNSA Journal
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
IJNSA Journal39 vistas
Internet of Things and its Enabling Technologies - RFID por Swetha Kogatam
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
Swetha Kogatam7.1K vistas
Implementation of radio frequency identification technology in accessing info... por eSAT Journals
Implementation of radio frequency identification technology in accessing info...Implementation of radio frequency identification technology in accessing info...
Implementation of radio frequency identification technology in accessing info...
eSAT Journals217 vistas
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf por Manju Badiger
Radio_Frequency_Identification_RFID_Based_Car_Park.pdfRadio_Frequency_Identification_RFID_Based_Car_Park.pdf
Radio_Frequency_Identification_RFID_Based_Car_Park.pdf
Manju Badiger57 vistas
Rfid ( Radio Frequency Identification ) Essay por Lindsay Alston
Rfid ( Radio Frequency Identification ) EssayRfid ( Radio Frequency Identification ) Essay
Rfid ( Radio Frequency Identification ) Essay
Lindsay Alston5 vistas
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin... por Alexander Decker
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker248 vistas
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin... por Alexander Decker
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker151 vistas
A research survey rfid security & privacy issue por csandit
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issue
csandit648 vistas
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE por cscpconf
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEA RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
cscpconf139 vistas
A Novel RFID Readers Employee Management System por IJMTST Journal
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
IJMTST Journal43 vistas
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module por inventionjournals
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
inventionjournals185 vistas
Radio Frequency Identification (RFID) Based Employee Management System (EMS) por inventionjournals
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
inventionjournals359 vistas
Enhancement of security in rfid using rsa algorithm por Alexander Decker
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
Alexander Decker318 vistas

Último

"Node.js Development in 2024: trends and tools", Nikita Galkin por
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin Fwdays
17 vistas38 diapositivas
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
24 vistas52 diapositivas
PRODUCT LISTING.pptx por
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptxangelicacueva6
18 vistas1 diapositiva
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
72 vistas29 diapositivas
The Research Portal of Catalonia: Growing more (information) & more (services) por
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
115 vistas25 diapositivas
Piloting & Scaling Successfully With Microsoft Viva por
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaRichard Harbridge
13 vistas160 diapositivas

Último(20)

"Node.js Development in 2024: trends and tools", Nikita Galkin por Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays17 vistas
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc72 vistas
Piloting & Scaling Successfully With Microsoft Viva por Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Richard Harbridge13 vistas
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi139 vistas
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker48 vistas
Special_edition_innovator_2023.pdf por WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 vistas
Case Study Copenhagen Energy and Business Central.pdf por Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana17 vistas
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman38 vistas
Business Analyst Series 2023 - Week 3 Session 5 por DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10345 vistas
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 vistas

Radio Frequency Identification (RFID) Security issues and possible solutions

  • 1. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 3, September 2013 341 Abstract— Radio-frequency identification (RFID) has become popular for automated identification and tracking of objects, goods and people. As the applications of RFID are expanding every day, new security issues also will be appeared. This paper speaks about fundamentals of RFID systems and security issues which can be raised in each one of the RFID architecture parts, as a wireless communication technology. This paper emphasize on the requirement of security in each special type of RFID systems applications, different kind of treats which can influence the security and safety of the RFID applicants and the last improvements of existing security and privacy methods and protocols. Index Terms— Reader, RFID, Security, Tag. I. INTRODUCTION Radio-frequency identification (RFID) is an automatic identification and data capturing technology, which can be used in different fields in order to identify and track goods and people. The history of RFID returns to around 70 years back in Second World War which RFID was used to identify enemy aircraft. However, today’s RFID applications are somehow different with its initial applications. Undoubtedly new applications of RFID have made a revolution in inventory and automation processes; RFID can be seen everywhere from supply chain inventory to animal identification, from health care management to RFID enable passports or in a supermarket like a barcode for goods. A. RFID Fundamental RFID system has at least a tag and a reader. A tag consists of a microchip, capacitors and an antenna coil. A tag communicates with an RFID reader through radio signals. RFID reader is used in order to do the tag inquiries and grasp the needed information from the tag. The reader sends out some radio waves to interrogate the tag. [1] These radio waves are emitted by reader’s antenna then RFID tag replies the radio waves while in the other side the reader is connected to a backend database which processes the information’s sent by the tag. RFID tag's microchip saves the information that are important like product code, id number or any information which must be retrieved by the reader. RFID tags are two general types: passive and active.  Passive tags: this type of tags does not need battery to work. They generate power from a signal of an outer reader. The passive tags reflect the radio frequency signal transmitted to them from a reader then add information by modulating the reflected signal, and obtain power from the signal of an external reader. The most known application of passive tags is to replace the customary barcode technology (with some important advantages in compare to barcode) and has much lighter weight and chipper price in compare with active tag, and also virtually its effective lifetime is infinite .nevertheless on the other side, read ranges of passive tags is very limited. [2]  Active tags: are battery-powered tags (usually on-board battery) and so having more transmission range and stronger signal in compare with the passive tags. That is why the readers can touch them from longer distance. [3]The onboard power supply increases the size and price of the active tags so active tags are larger and more expensive than the passive tags, thus large items tracked over long distance are the best operational platform for active tags. In comparison of two tags, it is obvious that passive tags are very inexpensive. Today each piece of passive tags is around 20 cents which seems a reasonable price to integrate into common materials and products, although technology is trying to make them chipper. Furthermore, passive tags size can also be quite small. By the new technology findings, about the tags antenna the size of new passive tags limits to about the size of a quarter. [2] Fig 1- RFID Components [10] II. RFID SECURITY ISSUES Although the contactless nature of RFID and its fast speed in affording the information grants a big superiority over known machine-readable identification method’s, some types of vulnerabilities are there in RFID systems which make them permeable to a wide range of attacks. Generally, RFID security issue and possible attacks can be divided in three major categories:  Attacks which affect RFID edge hardware part  Attacks which affect the communication part  Attacks which affect the data support part Radio Frequency Identification (RFID) security issues and possible solutions Mohsen Khosravi, Ahmad Sharifi, Dr. Asadullah Shah
  • 2. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 3, September 2013 342 B. RFID Edge hardware It consists of RFID physical and touchable devices. In RFID systems two major physical devices are available “tag and reader”. Tampering vulnerability can be seen in these devices due to common security weakness in these devices. [3]. C. Communication part Information swapping is the major duty of the communication part. Most of the attacks in this part, are pointed to radio link. If the attacker can listen in, it can be ease to modify or jam the signal. The third part of RFID system is data support part, which connects the RFID reader to database and is vulnerable for different types of attacks. In each one of three parts of an RFID system attackers try to break one of this three security properties:  Confidentiality  integrity  Availability Confidentiality guaranties that unauthorized hands cannot access the important information or services. Integrity ensures that information or services are not touched, altered or modified by unauthorized hands. Availability guaranties that information and/or services should be always attainable to all rightful hands. [4]According to the three general security properties in RFID systems, possible attacks can be divided in six general types:  spoofing identity  tempering with data  Repudiation  information exposure  denial of service  looming of privilege [5] Spoofing occurs when an attacker successfully puts on as an authorized user of a system and so, for example can perform an inventory of a store without any authorization through the scanning the EPC tags. When the attacker modifies, adds, deletes, or reorders the data, tempering attack occurs. For example modification of the tag on the passport while, modifies EPC number on tags in the shopping mall, kills or erases a tag in supply chain. Repudiation occurs when a user denies an action and no proof exist to prove that the action was performed, for example a retailer denies receiving a certain pallet, case or item or in other example the owner of the EPC number denies having information about the item to which the tag is attacked. Information exposure happens when the information is manifested to an unauthorized user i.e., a smart bomb placed at a street corner detonates in the time that a specific person with an RFID-enable passport discovered. Denial of service occurs when the system denies service to a valid user and for performing this attack, a tag can be killed, blocked to shoplifter can take the stolen item out of the shop or removed and maybe physically destroyed. Looming of privilege occurs when an unprivileged user or attacker gains higher privilege in the system than what they are empowered for example attacker can write or add malicious data in to the system as an administrator. [6] Fig 2- Communication III. POSSIBLE SOLUTIONS In the previous section, shows several types of attack are possible to occur in RFID systems. In this section, the most known security solutions proposed ever will be explained. [7]  Killing the tag: The first and easiest solution, when a tag is in the treat is to kill the tag. Each tag has a unique password, which has programed in the production time. Once the right password entered, the tag will be deactivated evermore.  The solid cage method: In this method, tag will be isolated from any electromagnetic waves. This can be gained by using a container made of metal mesh or foil that is impermeable by radio signals.  Blocking a tag: If more than one tags respond an inquiry sent by a reader, it figures out a collision, this method is used in the protocols like ALOHA and tree-walking protocols. [3]  Classic cryptographic methods: Cryptography algorithms and methods examples are rewritable memory, symmetric key encryption and public key encryption, which are used to keep the system secure. [7]  Using hash function: One of the most proposed methods for preserving the RFID system security is to use the hash function schemes like hash lock scheme, randomized hash lock scheme and hash chain scheme. [8]In addition to the named methods for maintaining RFID systems security and privacy some types of protocols like PRF private authentication scheme, tree-based private authentication, delegation tree, human protocols are proposed. [9] IV. CONCLUSION Although, today the RFID technology can be seen everywhere with different types of applications, but there are
  • 3. ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 3, September 2013 343 drawbacks and security issues yet that technology has not find perfect solutions for them this security issues make the society unwilling to accept the RFID systems with open arms in the case of sensitive applications like banking card. So if security and privacy problems be solved completely then the technology can guaranty the safety of the applicants curtail information which will lead to raise of the users satisfactory and of course more RFID universalization. REFERENCES [1] Knospe, H. and H. Pohl, RFID security. Information Security Technical Report, 2004. 9(4): p. 39-50. [2] LIU, L.M.N.a.Y., LANDMARKING: Indoor location Sensing Using Active RFID. Kluwer Academic Publisher. manufactured in nwtherlands, 2004. 10: p. 10. [3] Weinstein, R., RFID: a technical overview and its application to the enterprise. IT professional, 2005. 7(3): p. 27-33. [4] Mitrokotsa, A., M. Beye, and P. Peris-Lopez, Classification of RFID Threats based on Security Principles. [5] Thompson, T., D.R., N. Chaudhry, and C.W. Thompson. RFID security threat model. in Conf. on Applied Research in Information Technology. 2006. [6] Duc, D.N., et al. Open issues in RFID security. in Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for. 2009. IEEE. [7] Pedro Peris-Lopez, J.C.H.-C., Juan M. Estevez-Tapiador, and Arturo Ribagorda, RFID SYSTEMS: A Survey on Security Thereats and Proposed Solutions. p. cuenca nad l. orozco- barbosa (Eds): PWC 2006, LNCS 4217, pp. 159-170, 2006 [8] Li, Y.Z., et al. Security and privacy on authentication protocol for low-cost RFID. in Computational Intelligence and Security, 2006 International Conference on. 2006. IEEE. [9] IFIP international federation for information processing 2006, 2006: p. 159-170. [10] www.digitivity.com AUTHOR’S PROFILE Mohsen Khosravi. He is PhD student in the Information Technology department of Information and Communication Technology (KICT) of International Islamic University Malaysia (IIUM). He has received his master of Information Technology from Jawaharlal Nehru Technological University (JNTU), Hyderabad, India. His bachelor is software engineering from Azad university of Lahijan, Iran. His fields of interests are ADHOC, WSN and RFID that he works on it specially. Ahmad Sharifi. He has received M.Tech in Computer Networks and Information Security from Jawaharlal Nehru Technological University (JNTU), Hyderabad, India. In addition, he has received his bachelor in Electronic engineering from industrial university of Shahroud, Iran. Ahmad has professional experiences on technical engineering on ISP and network designs for many years. In addition, he is involving with teaching in universities. He interests in Cryptography, WSN, ADHOC, MATLAB, OPNET and other related issues. His personal website is www.ahmadsharifi.com. Furthermore, he cooperates with RIPE NCC www.ripe.net via www.sharifisp.com that is Internet Service Provider. PROF. DR. ASADULAH SHAH. He is Professor at Department of Computer Science, Kulliyyah of Information and Communication Technology, IIU Malaysia. Dr. Shah has a total of 24 years teaching and research experience. He has 60 research publications in International and national journals and conference proceedings. Dr. Shah has done his undergraduate degree in Electronics, Master’s degree in Computer Technology from the University of Sindh, and PhD in Multimedia Communication, from the University of Surrey, England, UK. His areas of interest are multimedia compression techniques, research methodologies, speech packetization and statistical multiplexing. He has been teaching courses in the fields of electronics, computers, telecommunications and management sciences.