Presented By- Kashish Goel (46) Hershit Gupta (137) Mitesh Kumar (150)
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
-
Upload
eugene-oneal -
Category
Documents
-
view
219 -
download
3
Transcript of Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
![Page 1: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/1.jpg)
Radio Frequency Identification
ByBhagyesh LodhaVinit MahediaVishnu SaranMitesh Bhawsar
![Page 2: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/2.jpg)
Introduction Automatic Identification method for storing and
retrieving data remotely Small object which is embedded inside a person,
animal or any product A silicon microchip mainly Integrated Circuit
attached to Antenna for Transmitting and receiving of data.
![Page 3: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/3.jpg)
RFID reader wirelessly communicate with the tag to retrieve information
The Reader and tag communicates with each other through Radio Frequency
Introduction (continue…)
![Page 4: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/4.jpg)
RF Subsystem RFID Tags
- Electronic device Affix inside any object.
- Each Tag has Unique Identifier.
- Has memory, environment sensors and security mechanism.
RFID Readers
- Communicates with RFID Tags RFID Tags and Readers are 2 way communication.
![Page 5: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/5.jpg)
RFID Tag Characteristics Identifier Format
- Uniquely identifies tags
- Data Format used is Electronic Product Code.
- Four data fieldsHeader EPC Manager Id Object Class Serial Number
Specifies EPC type
Uniquely Define the organization responsible
Uniquely identifies class object
Uniquely identifies instants of class object
![Page 6: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/6.jpg)
Power Source1. Passive:- Has no internal power supply- Incoming radio frequency gives enough power to CMOS IC to power up- Antenna is designed to collect power.
RFID Tag Characteristics (Continue)
![Page 7: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/7.jpg)
2. Active- Has own internal power source- Uses for high power source, in water and may have sensors3. Semi Passive- Has battery but only powers the IC and does not help in transmitting any signal- Usually stores energy
RFID Tag Characteristics (continue)
![Page 8: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/8.jpg)
RFID Security Controls RFID Usage Policy
- Authorized and Unauthorized use of RFID Minimizing sensitive Data Stored on Tag HMAC Tag Memory Access Control Encryption of Data
![Page 9: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/9.jpg)
Authentication Assurance of identity of an entity at other end Secret Key or Public key Cryptography is used Public key Cryptography is more preferable since
there is no key exchange and public key is transfer through digital signature
Two methods
- Zero Knowledge Protocol
- Challenge Response Protocol
![Page 10: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/10.jpg)
Challenge Response Protocol Reader sends challenge to the RFID tag The challenge is encrypted public key made from
private key RFID Tag decrypts the response with its on private
key and result is same along with sending a response to the Reader
RFID Tag has EPROM memory to store the private key with microcontroller to process the request.
![Page 11: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/11.jpg)
RFID TAG With Authentication Mechanism
Challenge Response Protocol (continue)
![Page 12: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/12.jpg)
Protocol Implementation
Challenge Response Protocol (continue)
![Page 13: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/13.jpg)
Applications Tracking goods during supply chain and
manufacturing process. Controlled access to building or network Scanning objects Payment systems Airline passenger and baggage tracking made
practical and less intrusive Authentication systems already in use (key-less car
entry)
![Page 14: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/14.jpg)
Types of Attack• Spoofing
Incorrect data , e.g. wrong domains • Insert
SQL Injection• Replay
Original message replayed later • Denial of Service
Signal with redundant data flooding
![Page 15: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/15.jpg)
![Page 16: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/16.jpg)
Attacks Cont. Blended Attacks
attack the RF interface of a retailer
![Page 17: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/17.jpg)
Electronic Product Code EPC
The EPC is the fundamental identifier for a physical object. Auto-ID
Electronic Product Code Data Specification 1.0 defines the abstract content
of the EPC in the form of RFID tags, Internet URLs, and other representations.
![Page 18: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/18.jpg)
RFID Middleware Overview
![Page 19: Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.](https://reader033.fdocuments.in/reader033/viewer/2022042703/56649e125503460f94afe2c0/html5/thumbnails/19.jpg)
DES Encryption Algorithm