ChatGPT-and-Generative-AI-Landscape Working of generative ai search
RFID based tracking System
1. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
RFID Based Tracking System
Shahrukh Ayaz Khan
Seminar Presentation
SSBT’s College of Engineering & Technology,
Bambhori, Jalgaon - 425 001, Maharashtra, India
April 10, 2015
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 1/27
4. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Introduction
In last few years RFID technology has become a major
driver for various business like logistics, supply chain
management and acess control
Many of these applications have based on successful
implementations of RFID tags but on reader’s side we
show how semi-passive tags helps implementing and
attacking security enhanced RFID.
It has various security and privacy concerns, which is due
to the inherent vulnerabilities in the architecture of the
RFID system..
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 4/27
5. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
What is RFID?
Radio Frequency Identification
Uses Radio Frequency waves to transfer data between a
reader and a tag to identify, categorize, track...
One form of Automatic Identification
RFID is fast reliable and does not require physical sight or
contact between reader/scanner and the tagged item.
Provides unique identification or serial number of an
object (pallets, cases, items, animals, humans
Some of the large companies like Microsoft and Wallmart
are mandating their suppliers to use RFIDs to cut their
warehousing costs and other relating expenses
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 5/27
7. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Why was RFID invented?
Like most technologies used today, RFID got it start from
WWII. The parent technology of RFID is transponder.
Transponders are radio devices that can recieve or send
signals. They are found virtually on all aircrafts and
watercrafts.
In WWII transponders were used as IFF (identify Friend or
Foe) to distinguish Allied Aircraft from enemey ones.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 7/27
8. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Key Components of RFID system
A RFID system is made up of two parts: a tag or label and
a reader.
RFID tags or labels are embedded with a transmitter and
a receiver.
The RFID component on the tags have two parts: a
microchip that stores and processes information, and an
antenna to receive and transmit a signal.
RFID Reader is also known an interrogator
Figure: Basic Parts of RFID system
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 8/27
10. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Types of tags
Passive: gets energy from reader
Active: battery powered
Semi-passive: battery and energy from reader The
Semi-passive tags are mainly targeted for the security and
privacy attacks
Figure: Use of tags
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 10/27
13. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
How it Works?
The tag contains the specific serial number for one specific
object.
To read the information encoded on a tag, a two-way
radio transmitter-receiver called an interrogator or reader
emits a signal to the tag using an antenna.
The tag responds with the information written in its
memory bank.
The interrogator will then transmit the read results to an
RFID computer program.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 13/27
15. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Security and Privacy challenges
RFID Tag Cloning Attack :cloning is done by forging the
data from an authentic tag generally into a blank tag
Physical Attack: Any kind of tampering to tag
architecture depending upon intention of attacker
Skimming Attack: Usually done by reading the data of tag
without authorization of tag holder
Spoofing Attack: Attacker try to act like a reader inorder
to interrogate tags
Relay Attack: Attacker acts an Man In Middle between
tag and reader
Denial of Services(DOS) Attack: It involves jamming of
operating frequency of communication channel
Clandestine Tracking: It exploits the ubiquitous nature of
the tag, thus making it a very easy attack prone
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 15/27
16. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Sucessful Attacks
HID cards (2007)
Britsh e-Passports(2008)
RFID credit cards(2009)
Sacremento Capitol access cards(2010)
Human Implantable ”VERICHIP”(2010)
Dutch e-Passports(2009)
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 16/27
18. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Some of the Applications
People/Animal tracking
Figure: Animal/ Human Tracking
Manufacturing or Supply chain Management
Figure: Supply Chain Mangement
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 18/27
19. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Contd..
Government Issued Machine readable travel documents
Figure: e-Passports
Toll collection and contactless payment
Figure: Toll booth
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 19/27
21. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Recent Innovation
Small RFID chip, here compared to a grain of rice, is
incorporated in consumer products, and implanted in pets,
for identification purposes
Figure: Small RFID chip ”Verichip”
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 21/27
23. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Advantages
Inventory efficiency
Vulnerability to damage minimized
Easy to use
High memory capacity
Cannot be easily replicated and therefore, it increases the
security of the product.
Simple to install/inject inside the body of animals/human
beings
Disadvantages
Security concerns like possibility of unauthorized reading of
passports and credit cards
More expensive than barcode system
Unread tags
Doesnt work properly on liquids and metal products.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 23/27
25. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
Conclusion
In this research, we identified the various challenges facing
RFID Card, with careful references.
We also highlighted the diverse application areas of the
RFID technology
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 25/27
26. RFID
Outline
Introduction
The Basics
Working of
RFID
Concerns
Applications
Pros and Cons
Conclusion
References
1 D. Anthony, T. Henderson, and D. Kotz, Privacy in
location aware computing environments, IEEE Pervasive
Computing,2009.
2 A. Beresford and F. Stajano, Location privacy in pervasive
computing, IEEE Pervasive Computing, 2011.
3 A. R. Beresford and F. Stajano, Mix zones: User privacy in
location-aware services, in Pervasive Computing and
Communications Workshops (PERCOMW), 2008.
4 J. I. Hong and J. A. Landay, An architecture for privacy
sensitive ubiquitous computing, in International conference
on Mobile systems, applications, and services (MobiSys),
2009.
April 10, 2015 Shahrukh Ayaz Khan RFID based tracking for Privacy control 26/27