Spelling suggestions: "subject:"RFID 2security"" "subject:"RFID bsecurity""
1 |
Cloning Prevention Protocol for RFIDShah, Jignasa 09 December 2010 (has links)
Radio Frequency Identification (RFID) is an emerging area under ubiquitous computing. RFID benefits include multiple read/write, longer read range and no requirement for line of sight. Due to security and privacy issues, RFID is not as popular as it should be. Tag cloning is one of the biggest threats to RFID systems. Easy access to RFID tags allows an attacker to replicate the tags and insert duplicate tags into the system. An RFID tag cloning attack can lead to access control or financial frauds in areas like supply chain management and government issued IDs.
In this thesis, a cloning prevention protocol is proposed. It uses light weight functions such as Pseudo Random Number Generator (PRNG) and compare function. A 3-way handshake with a secret key, frequency hopping mechanism and dynamic fake ID makes this protocol a secure authentication mechanism.
|
2 |
RFID přístupový systém v místnosti / RFID based access system in roomsMego, Roman January 2012 (has links)
The master’s thesis aims to design an access control system using the RFID technology. The system should reduce security risks associated with its use. While working on project two devices were created. First is the access terminal operating on frequency of 13.56 MHz and second is the RFID reader for PC operating at frequency 125 kHz. Software for devices was created as well as system control application for PC. The document contains an overview of the RFID principles and possibility of implementation access control system. Next part of the project describes in detail step by step the process of designing electrical circuit for system parts. Last part talks about realized software, libraries which are used and the system control application for PC.
|
3 |
A secure quorum based multi-tag RFID systemAl-Adhami, Ayad January 2018 (has links)
Radio Frequency Identification (RFID) technology has been expanded to be used in different fields that need automatic identifying and verifying of tagged objects without human intervention. RFID technology offers a great advantage in comparison with barcodes by providing accurate information, ease of use and reducing of labour cost. These advantages have been utilised by using passive RFID tags. Although RFID technology can enhance the efficiency of different RFID applications systems, researchers have reported issues regarding the use of RFID technology. These issues are making the technology vulnerable to many threats in terms of security and privacy. Different RFID solutions, based on different cryptography primitives, have been developed. Most of these protocols focus on the use of passive RFID tags. However, due to the computation feasibility in passive RFID tags, these tags might be vulnerable to some of the security and privacy threats. , e.g. unauthorised reader can read the information inside tags, illegitimate tags or cloned tags can be accessed by a reader. Moreover, most consideration of reserchers is focus on single tag authentication and mostly do not consider scenarios that need multi-tag such as supply chain management and healthcare management. Secret sharing schemes have been also proposed to overcome the key management problem in supply chain management. However, secret sharing schemes have some scalability limitations when applied with high numbers of RFID tags. This work is mainly focused on solving the problem of the security and privacy in multi-tag RFID based system. In this work firstly, we studied different RFID protocols such as symmetric key authentication protocols, authentication protocols based on elliptic curve cryptography, secret sharing schemes and multi-tag authentication protocols. Secondly, we consider the significant research into the mutual authentication of passive RFID tags. Therefore, a mutual authentication scheme that is based on zero-knowledge proof have been proposed . The main object of this work is to develop an ECC- RFID based system that enables multi-RFID tags to be authenticated with one reader by using different versions of ECC public key encryption schemes. The protocol are relied on using threshold cryptosystems that operate ECC to generate secret keys then distribute and stored secret keys among multi RFID tags. Finally, we provide performance measurement for the implementation of the proposed protocols.
|
4 |
Evaluation of Current Practical Attacks Against RFID TechnologyKashfi, Hamid January 2014 (has links)
Radio Frequency Identification (RFID) is a technology that has been around for three decades now. It is being used in various scenarios in technologically modern societies around the world and becoming a crucial part of our daily life. But we often forget how the inner technology is designed to work, or even if it is as trustable and secure as we think. While the RFID technology and protocols involved with it has been designed with an acceptable level of security in mind, not all implementations and use cases are as secure as consumers believe. A majority of implementations and products that are deployed suffer from known and critical security issues. This thesis work starts with an introduction to RFID standards and how the technology works. Followed by that a taxonomy of known attacks and threats affecting RFID is presented, which avoids going through too much of technical details but provides references for farther research and study for every part and attack. Then RFID security threats are reviewed from risk management point of view, linking introduced attacks to the security principle they affect. We also review (lack thereof) security standards and guidelines that can help mitigating introduced threats. Finally to demonstrate how practical and serious these threats are, three real-world case studies are presented, in which we break security of widely used RFID implementations. At the end we also review and highlight domains in RFID security that can be researched farther, and what materials we are currently missing, that can be used to raise awareness and increase security of RFID technology for consumers. The goal of this thesis report is to familiarize readers with all of the publicly documented and known security issues of RFID technology, so that they can get a sense about the security state of their systems. Without getting involved with too much technical details about every attack vector, or going throw tens of different books and papers, readers can use this report as a comprehensive reference to educate themselves about all known attacks against RFID, published to the date of writing this report.
|
5 |
System and Method for Passive Radiative RFID Tag Positioning in Realtime for both Elevation and Azimuth DirectionsModaresi, Mahyar January 2010 (has links)
<p>In this thesis, design and realization of a system which enables precise positioning of RFID tags in both azimuth and elevation angles is explained. The positioning is based on measuring the phase difference between four Yagi antennas placed in two arrays. One array is placed in the azimuth plane and the other array is perpendicular to the first array in the elevation plane. The phase difference of the signals received from the antennas in the azimuth array is used to find the position of RFID tag in the horizontal direction. For the position in the vertical direction, the phase difference of the signals received from the antennas in the elevation plane is used. After that the position of tag in horizontal and vertical directions is used to control the mouse cursor in the horizontal and vertical directions on the computer screen. In this way by attaching one RFID tag to a plastic rod, a wireless pen is implemented which enables drawing in the air by using a program like Paint in Windows. Simulated results show that the resolution of the tag positioning in the system is in the order of 3mm in a distance equal to 0.5 meter in front of the array with few number of averaging over the received phase data. Using the system in practice reveals that it is easily possible to write and draw with this RFID pen. In addition it is argued how the system is totally immune to any counterfeit attempt for faked drawings by randomly changing the transmitting antenna in the array. This will make the system a novel option for human identity verification.</p> / QC 20100920
|
6 |
System and Method for Passive Radiative RFID Tag Positioning in Realtime for both Elevation and Azimuth DirectionsModaresi, Mahyar January 2010 (has links)
In this thesis, design and realization of a system which enables precise positioning of RFID tags in both azimuth and elevation angles is explained. The positioning is based on measuring the phase difference between four Yagi antennas placed in two arrays. One array is placed in the azimuth plane and the other array is perpendicular to the first array in the elevation plane. The phase difference of the signals received from the antennas in the azimuth array is used to find the position of RFID tag in the horizontal direction. For the position in the vertical direction, the phase difference of the signals received from the antennas in the elevation plane is used. After that the position of tag in horizontal and vertical directions is used to control the mouse cursor in the horizontal and vertical directions on the computer screen. In this way by attaching one RFID tag to a plastic rod, a wireless pen is implemented which enables drawing in the air by using a program like Paint in Windows. Simulated results show that the resolution of the tag positioning in the system is in the order of 3mm in a distance equal to 0.5 meter in front of the array with few number of averaging over the received phase data. Using the system in practice reveals that it is easily possible to write and draw with this RFID pen. In addition it is argued how the system is totally immune to any counterfeit attempt for faked drawings by randomly changing the transmitting antenna in the array. This will make the system a novel option for human identity verification. / QC 20100920
|
7 |
Anomaly Detection in RFID NetworksAlkadi, Alaa 01 January 2017 (has links)
Available security standards for RFID networks (e.g. ISO/IEC 29167) are designed to secure individual tag-reader sessions and do not protect against active attacks that could also compromise the system as a whole (e.g. tag cloning or replay attacks). Proper traffic characterization models of the communication within an RFID network can lead to better understanding of operation under “normal” system state conditions and can consequently help identify security breaches not addressed by current standards. This study of RFID traffic characterization considers two piecewise-constant data smoothing techniques, namely Bayesian blocks and Knuth’s algorithms, over time-tagged events and compares them in the context of rate-based anomaly detection.
This was accomplished using data from experimental RFID readings and comparing (1) the event counts versus time if using the smoothed curves versus empirical histograms of the raw data and (2) the threshold-dependent alert-rates based on inter-arrival times obtained if using the smoothed curves versus that of the raw data itself. Results indicate that both algorithms adequately model RFID traffic in which inter-event time statistics are stationary but that Bayesian blocks become superior for traffic in which such statistics experience abrupt changes.
|
Page generated in 0.0381 seconds