RFID : Security and Privacy - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

RFID : Security and Privacy

Description:

The active jamming approach. The 'Smart RFID' tag approach. The 'Hash-lock' Approach ... Selective RFID jamming. DoS Resistence. Brief overview. RFID Basics ... – PowerPoint PPT presentation

Number of Views:350
Avg rating:3.0/5.0
Slides: 26
Provided by: abh755
Category:

less

Transcript and Presenter's Notes

Title: RFID : Security and Privacy


1
RFID Security and Privacy
  • Abhijeet Gaikwad

2
RFID fundamentals
  • Radio Frequency IDentification
  • Tags or transponders, carry Identifying data
  • Readers or transceivers, read or write tag data
  • Back end databases
  • Active Tags
  • Passive Tags

3
Applications
  • Supply chain management
  • Payment Systems
  • Access Control
  • E-passports
  • Mexico City police 170 city police implanted
    with Verichip to allow access to police databases
  • Medical records
  • Cattle Herding

4
(No Transcript)
5
The problem of security and Privacy
6
Id would rather grow a beard and f(k
Gillette..
Now RFID spy chips can even be printed, meaning
the dot on a printed letter i could be used to
track you,-CASPIAN website.
7
(No Transcript)
8
(No Transcript)
9
Other approaches
  • The active jamming approach
  • The Smart RFID tag approach
  • The Hash-lock Approach
  • The re-encryption Approach
  • Silent tree walking

10
Solutions
  • Blocker tags
  • Clipped tags
  • RFID Guardian

11
(No Transcript)
12
(No Transcript)
13
(No Transcript)
14
(No Transcript)
15
(No Transcript)
16
(No Transcript)
17
(No Transcript)
18
Clipped Tags
  • kill-tag approach
  • Perforation
  • Peel-off layer
  • Removable electrical
  • Conductor

19
Need for unified approach
  • Centralized use and Management
  • Context Awareness
  • Ease-of-use
  • Real-world usability

RFID Guardian
20
RFID Guardian A unified approach
  • Resembles RFID Firewall
  • A mediator between Tag and Reader
  • Coordinated usage of RFID security mechanism
  • Fine-grained control over RFID based auditing,
    key management, access control, and
    authentication capabilities

21
System Functionality
  • Auditing
  • Scan logging
  • Tags logging
  • Key Management
  • 2-way communication ability (done by
    eavesdropping over secured communication channel)
  • Access control
  • Security policies as Access Control Lists (ACLs)
  • Context Awareness
  • Tag-reader mediation
  • Authentication

22
Implementaion of RFID guardian
23
Issues with RFID Guardian
  • Selective RFID jamming
  • DoS Resistence

24
Brief overview
  • RFID Basics
  • Applications and threats
  • Countermeasures for Privacy of consumers
  • Blocker Tags
  • Clipped Tags
  • RFID Guardian Unified Approach

25
Thank you !
Write a Comment
User Comments (0)
About PowerShow.com