Security Applications Challenges of RFID Technology and Possible Countermeasures
Security Applications Challenges of RFID Technology and Possible Countermeasures
Table 1 outlines a comparison between the LF, HF and 206 255 LF11784-5
UHF. UHF 18000-6
1320 HF-14443
3. RFID SYSTEM CLASSIFICATION 285
HF-15693 and 18000-3
the operating frequency of the system Figure 3: RFID Frequency use [3].
the power source of the tags
An RF signal can be efficiently radiated if the size of the
3.1. Frequency allocation of the RFID antenna is comparable to the wavelength of the operating
frequency.
Frequency is a major factor in RFID. The characteristics of
the electromagnetic wave change from a band to another. However, for 13.56 MHz frequency the expected antenna
size is about 22.12 meters, which is not feasible. As
292
alternative, a small loop antenna circuit, resonating at the
operating frequency, is used. 15961,15962, 18000 Radio frequency identification (RFID) for
the object management.
Compared to HF (13.56MHz) and Microwave (2.45GHz),
the basic advantage of UHF passive RFID system is its long
10536, 14443,15693 Identification cards - cards Integrated circuit
range communication between the reader and tags. (s) integrated (s) without contact.
293
RFID technology itself, but rather in the ability to integrate
860 - 960 Part 6: it effectively to improve the operation and management of
18000-6 Communications 31/08/2004
MHz systems [27].
Settings for air
interface of between
860 MHz and 960 The following diagram summarizes the case studies in the
MHz different RFID application fields undertaken by reference
[28].
18000-7 433 MHz Part 7: Parameters 15/01/2008
for active air
interface at 433 MHz
800
700
* The realization of the standard 18000-5 has been abandoned in 600
500
February 2003, lack of consensus. 400
300
200
Table 3: Standards ISO 18000-x for the standardization of 100
RFID interfaces in the field of products. 0
294
spoofing and power attacks. Some kinds of different attacks device. It has been shown that the power emission patterns
are explained below and the necessary countermeasures is are different when the card received correct and incorrect
provided as a way of protection and safeguard. password bits or cryptographic keys. It is possible to breach
smart card security by monitoring power consumption
signals. It is also predicted that a power analysis attack on a
RFID tags could be carried out using a simple common
device such as a cell phone.
Countermeasures
5.3 Eavesdropping
Fig. 5: Possible RFID attacks Eavesdropping is the act of secretly listening to the private
conversation of others without their consent. Given that an
5.1 Reverse engineering RFID tag is a wireless device that emits and transmits data,
there always exists a risk that the communication between
Reverse engineering is the process of discovering the tag and reader can be eavesdropped when interrogated by
technological principles of a device, object, or a system an RFID reader. Eavesdropping will happen when an
through the analysis of its structure, functions and attacker captures data with an analogous reader (one with
operation. Taking into consideration the privacy issues most likely with same tag type and frequency), while a tag
related to the biometric e-passport, it could be feasible for is being read by an authorized RFID reader. As most RFID
an attacker to obtain access of the chip and examine its systems use clear text way of communication, due to tag
memory contents optically to recover the PIN, biometric low memory capacity and or cost, eavesdropping is an
data or any personal information, etc. The technical effortless action but it is an efficient way for the attacker to
capability and equipment required to reverse engineer such obtain and gather useful information on the collected tag
an integrated circuit can be rated at different stages from a data. The information obtained during the attack can have
knowledgeable individual who will be using low cost and serious implications and severe consequences, it could be
easily available tools to a highly skilled team, using used in future attacks against the same RFID system.
equipment not commonly available in the commercial
market (Actel, 2002). Countermeasures
Countermeasures The best action against eavesdropping does include
establishing a secure channel and/or encrypting the
As proposed by the Federal Information Processing communication between the tag and the reader.
Standard (FIPS), coatings a chip as an anti-reverse
engineering method to prevent attacks is taken into 5.4 Man-in-the-middle attack (MiM)
consideration. Different tamper proof procedures have been
developed to protect against reverse engineering attacks. The man-in-the-middle attack (MiM) is a form of active
For example, by adding a tamper-release layer to RFID eavesdropping in which the attacker makes independent
tags, user can be alerted if a tag has been tinkered with or connections with the victims and relays messages between
not. them, making them believe that they are talking directly to
each other over a private connection, when in fact the entire
5.2 Power analysis of RFID tags conversation is controlled by the attacker. The attacker can
interrupt the communication pathway and manipulate the
This type of attack is unique in that it requires no physical information back and forth between the RFID components
contact with the device under attack. Power analysis is a as illustrated in the figure below (Fig. 6). The attacker
type of side-channel attack that is meant to salvage data and
information by analyzing changes in the power use of such
295
exposes the data prior to the anticipated device obtain it and from a valid tag and creates a copy of the captured sample
can modify the information en route. on a blank tag.
Countermeasures
CONCLUSION
Figure 6: MiM attacker RFID technology is a powerful tool that is used namely in
assigning a unique identifier for each individual item, RFID
Countermeasures technology is used in wide range of applications. It does
offers an elegant way to identify objects and people. It does
There exist some techniques that can be applied to diminish not only identify each category of items but identifies each
MiM threats, such as encrypting data communications, individual item and assigns to it a unique number.
transfer information through a protected channel, and afford
an authentication protocol. RFID security challenges and countermeasures was studied
and presented. This paper has focused on many previous
5.5 Denial of Service (DoS) researchers state-of-the-art and latest research in this area
and presented different techniques to countermeasure
A denial-of-service (DoS) attack is an attempt to make a possible ways to prevent attackers to gain access to the
machine or network resource unavailable to its intended proposed system.
users. Although the means to carry out, motives for, and
targets of a DoS attack may vary, it generally consists of REFERENCES
efforts to temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet. DoS attacks
can take many forms to attack an RFID tag. The main [1]. EPC global, link: http://www.gs1.org/epcglobal
reason is not to take or modify any data or information, but
to immobilize the RFID system so that it will be disabled. [2].IDTechEx RFID Knowledgebase via website
http://www.idtechex.com/knowledgebase/en/browse.asp
Countermeasures
[3]. P. Harrop “RFID Forecasts, Players, Opportunities”
Detecting DoS attacks is easier than preventing them from IDTechEx 2007.
happening in general. Nevertheless, once the attack is
detected, it normally can be stopped before it can do too [4]. F. Chetouane and H. Hamam, "RFID lab for the Canadian
much damage by implementing filters to block unwanted University of Dubai: Overview & Technical Specifications",
traffic. Internal report, Nov 2007.
[5]. http://rfid.net/basics/186-iso-rfid-standards-a-complete-list-
5.6 Spoofing
[6]. Piratage de cartes à puce sans contact facile.
A spoofing attack is a situation in which one person or http://www.zataz.com/news/17472/
program successfully masquerades as another by falsifying
data and thereby gaining an illegitimate advantage. With [7]. La protection des puces RFID contournée,
respect to RFID system, spoofing take place when a http://datanews.levif.be/ict/actualite/la-protection-des-puces-rfid-
fictitious tag pretense as a legitimate tag and thereby gains contournee/article-1194718426411.htm
an illegitimate and illegal advantage. Tag duplication is a
spoofing attack where the attacker captures the information [8]. passeport biométrique se fait hacker en beauté,
http://www.silicon.fr/uk-le-passeport-biometrique-se-fait-hacker-
en-beaute-21265.html
296
[9]. Fake UK, USA, Australian Biometric Passports for sell. Conference on Information Systems 2010 (EMCIS2010). ISBN:
http://www.globalcitizencorps.org/groups/site-feedback/22840 978-1-902316-80-2.
[10]. Xeni Jardin (Mars 2008) BBtv - How to hack RFID-enabled [24]. I. Lacmanovi , B. Radulovi , D. Lacmanovi “Contactless
credit cards for $8 http://www.boingboing.net/2008/03/19/bbtv- payment systems based on RFID technology” MIPRO 2010, 1114
how-to-hack-an.html - 1119, ISBN: 978-1-4244-7763-0.
[21]. L.M. Ni, Y. Liu, Y.C. Lau, and A.P. Patil “LANDMARC:
Indoor Location Sensing Using Active RFID” Wireless Networks,
10, 701–710 (2004).
297