How to Cheat at Deploying and Securing RFID ( How to Cheat )

Publication series :How to Cheat

Author: Thornton   Frank;Sanghera   Paul  

Publisher: Elsevier Science‎

Publication year: 2011

E-ISBN: 9780080556895

P-ISBN(Paperback): 9781597492300

P-ISBN(Hardback):  9781597492300

Subject: TP309 安全保密

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

Major companies and countries around the world are adopting or considering whether to adopt RFID technologies. Visa and Wells Fargo are currently running tests with RFID, airports around the world are using RFID to track cargo and run customs departments, universities such as Slippery Rock are providing RFID-enabled cell phones for students to use for campus charges. According to the July 9 CNET article, RFID Tags: Big Brother in Small Packages?, "You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept, and CNET News.com's own Alorie Gilbert wrote last week about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, CA."

For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book!

* For most business orga

Chapter

Chapter 1: Physics, Math, and RFID: Mind the Gap

Introduction

Some Bare-Bones Physics Concepts

Understanding Electricity

Understanding Magnetism

Understanding Electromagnetism

Electromagnetic Waves

Types of Electromagnetic Waves

The Electromagnetic Spectrum

The Mathematics of RFID

Scientific Notation

Logarithms

Decibel

Units

An Overview of RFID: How It Works

Summary

Chapter 2: The Physics of RFID

Introduction

Understanding Radio Frequency Communication

Elements of Radio Frequency Communication

Modulation: Don't Leave Antenna Without It

The Propagation Problem

The Transmission Problem

Frequency Bands in Modulation

Understanding Modulation Types

Amplitude Modulation and Amplitude Shift Keying

Frequency Modulation and Frequency Shift Keying

Phase Modulation and Phase Shift Keying

On-Off Keying (OOK)

RFID Communication Techniques

Communication Through Coupling

Communication Through Backscattering

Understanding Performance Characteristics of an RFID System

Cable Loss

Impedance

The Voltage Standing Wave Ratio

Noise

Beamwidth

Directivity

Antenna Gain

Polarization

Resonance Frequency

Performing Antenna Power Calculations

Effective Radiated Power

Power Density

Link Margin

The Travel Adventures of RF Waves

Absorption

Attenuation

Dielectric Effects

Diffraction

Free Space Loss

Interference

Reflection

Refraction

Scattering

Summary

Key Terms

Chapter 3: Working with RFID Tags

Introduction

Understanding Tags

Components of a Tag

Tag Size

Operating Tag Frequencies

Understanding Tag Types

Passive Tags

Semipassive Tags

Active Tags

Tag Classification

Class 0 Tags

Class 1 Tags

Class 2 Tags

Class 3 Tags

Class 4 Tags

Class 5 Tags

Read Ranges of Tags

Labeling and Placing a Tag

Labeling a Tag

Inlay

Insert

Smart Labels

Pressure-Sensitive Labels

RFID-Enabled Tickets

Tie-On Tags

Selecting Adhesive Types for Tags

Placing a Tag

Shadowing

Tag Placement and Orientation

Polarization and Orientation

Orientation in Inductive Coupling

Summary

Key Terms

Chapter 4: Working with Interrogation Zones

Introduction

Understanding an Interrogator

What an Interrogator Is Made Of

Interrogator Types

Fixed-Mount Interrogators

Handheld Interrogators

Vehicle-Mount Interrogators

What an Interrogator Is Good For

Communication With the Host Computer

Communication With the Tags

Operational Capabilities

Communicating With the Host

Serial Connections

Network Connections

Dealing With Dense Environments

Understanding Collisions

Reader Collisions

Tag Collisions

Anticollision Protocols

Aloha-Based Protocols

Tree-Based Protocols

Configuring Interrogation Zones

Configuring Interrogator Commands

Configuring Interrogator Settings

Optimizing Interrogation Zones

The Network Factor

Operation Mode

Reader-to-Reader Interference

System Performance and Tuning

The Tag Travel Speed

Summary

Key Terms

Chapter 5: Working with Regulations and Standards

Introduction

Understanding Regulations and Standards

Regulations

Standards

Regulating Frequency Usage

The Regulatory Regions

Safety Regulations

RFID Standards

ISO Standards

EPCglobal Standards

Air Interface and Tag Data Standards

Tag Data Standards

Air Interface Protocols

Impact of Regulations and Standards

Advantages of Regulations

Advantages of Standards

Disadvantages of Regulations and Standards

Regulatory and Standards Bodies

Summary

Key Terms

Chapter 6: Selecting the RFID System Design

Introduction

Understanding RFID Frequency Ranges

RFID Frequency Ranges and Performance

The Low-Frequency (LF) Range

The High-Frequency (HF) Range

Ultra High Frequency (UHF) Range

The Microwave Range

Selecting Operating Frequency

Selecting Tags

Kinds of Tag

Tag Types

Tag Classes

Operating Frequency

Read Performance

Data Capacity

Tag Form and Size

Environmental Conditions

Standards Compliance

Selecting Readers

Reader Types

Ability to Upgrade

Installation Issues

Legal Requirements

Manageability

Quantity

Ruggedness

Working With Antennas

Understanding Antenna Types

Dipole Antennas

Monopole Antennas

Linearly Polarized Antenna

Circularly Polarized Antennas

Omnidirectional Antennas

Helical Antennas

Selecting Antennas

Selecting Transmission Lines

Impedance

Cable Length and Loss

Transmission Line Types

Mounting Equipment for RFID Systems

Conveyors

Dock Doors

Forklifts

Stretch Wrap Stations

Point-of-Sale Systems

Smart Shelf

Summary

Key Terms

Chapter 7: Performing Site Analysis

Introduction

Planning the Site Analysis

Plan the Steps Ahead

Understanding Blueprints

Performing a Physical Environmental Analysis

Harsh Environmental Conditions

Physical Obstructions

Metallic Material

Packaging

Cabling

Electrostatic Discharge

Performing an RF Environmental Analysis

Planning a Site Survey

Determining the Ambient EM Noise

Analyzing the Electrical Environmental Conditions

Protecting the RFID System from Interference and Noise

Preparing Your Own Blueprints

Let the Experiment Begin

Using the Results of Your Experiment

Summary

Key Terms

Chapter 8: Performing Installation

Introduction

Preparing for Installation

Putting Together an RFID Solution

Considering Power Sources

Batteries

Power Supply Units

Uninterruptible Power Supplies

Power Over Ethernet

The Standard Installation Process and Practices

Design Selection

Site Analysis

Installation Tasks

System Management

The Tag Thing

Installing Hardware

Installing Readers

Installing Antennas

Installing Cables

Testing During Installation

Interrogation Zone Tests

Unit Tests

Application Integration Tests

System Tests

Ensuring Safety

Equipment Safety from the Environment

Electrostatic Discharge

Grounding

Ground Loops

Safety Regulations

Working With Various Installation Scenarios

Setting Up Stationary Portals

Setting Up a Conveyor Portal

Setting Up a Dock Door Portal

Setting Up a Shelf Portal

Setting Up Mobile Portals

Handheld Interrogator Portals

Mobile-Mount Portals

Summary

Key Terms

Chapter 9: Working With RFID Peripherals

Introduction

Smart Labels: Where RFID Meets Barcode

Working With RFID Printers

Understanding RFID Printers

Installing the RFID Printer

Configuring the RFID Printer

Troubleshooting the RFID Printer

Understanding Ancillary Devices and Concepts

Encoders and Label Applicators

RFID Printer Encoders

Automated Label Applicators

Pneumatic Piston Label Applicators

Wipe-On Label Applicators

Feedback Systems

Photo Eyes

Light Trees

Horns

Motion Sensors

Real-Time Location Systems

Summary

Key Terms

Chapter 10: Monitoring and Troubleshooting RFID Systems

Introduction

Monitoring an RFID System

Understanding Root-Cause Analysis

Understanding Monitoring

Status Monitoring

Performance Monitoring

Monitoring and Troubleshooting Interrogation Zones

Mean Time Between Failures (MTBF)

Average Tag Traffic Volume

Actual Versus Predicted Traffic Rate

Read Errors to Total Reads Rate

Read Error Change Rate

Monitoring and Troubleshooting Tags

Identifying Improperly Tagged Items

Identifying Reasons for Tag Failures

Managing Tag Failures

Management Prior to Applying Tags

Management During Application

Management After Applying the Tags/During Tracking

Monitoring and Troubleshooting Hardware

Understanding the Causes of Hardware Failures

Diagnosing RFID Hardware Failures

Standard Troubleshooting Procedure

Summary

Key Terms

Chapter 11: Threat and Target Identification

Introduction

Attack Objectives

Radio Frequency Manipulation

Spoofing

Insert

Replay

DOS

Manipulating Tag Data

Middleware

Backend

Blended Attacks

Summary

Chapter 12: RFID Attacks: Tag Encoding Attacks

Introduction

Case Study: John Hopkins vs. SpeedPass

The SpeedPass

Breaking the SpeedPass

The Johns Hopkins Attack

Lessons to Learn

Summary

Chapter 13: RFID Attacks: Tag Application Attacks

MIM

Chip Clones - Fraud and Theft

Tracking: Passports/Clothing

Passports

Chip Cloning > Fraud

Disruption

Summary

Chapter 14: RFID Attacks: Securing Communications Using RFID Middleware

RFID Middleware Introduction

Electronic Product Code System Network Architecture

EPC Network Software Architecture Components

Readers

RFID Middleware

EPC Information Service

Object Name Service

ONS Local Cache

EPC Network Data Standards

EPC

PML

RFID Middleware Overview

Reader Layer-Operational Overview

Smoothing and Event Generation Stage

Event Filter Stage

Report Buffer Stage

Interactions with Wireless LANs

802.11 WLAN

Attacking Middleware with the Air Interface

Understanding Security Fundamentals and Principles of Protection

Understanding PKIs and Wireless Networking

Understanding the Role of Encryption in RFID Middleware

Overview of Cryptography

Symmetric Ciphers

Asymmetric Ciphers

Elliptic Curve Ciphers

Understanding How a Digital Signature Works

Basic Digital Signature and Authentication Concepts

Why a Signature Is Not a MAC

Public and Private Keys

Why a Signature Binds Someone to a Document

Learning the W3C XML Digital Signature

Applying XML Digital Signatures to Security

Using Advanced Encryption Standard for Encrypting RFID Data Streams

Addressing Common Risks and Threats

Experiencing Loss of Data

Loss of Data Scenario

The Weaknesses in WEP

Criticisms of the Overall Design

Weaknesses in the Encryption Algorithm

Weaknesses in Key Management

Securing RFID Data Using Middleware

Fields:

Using DES in RFID Middleware for Robust Encryption

Using Stateful Inspection in the Application Layer Gateway For Monitoring RFID Data Streams

Application Layer Gateway

Providing Bulletproof Security Using Discovery, Resolution, and Trust Services in AdaptLink(tm)

Discovery Service

Resolution, ONS, and the EPC Repository

EPC Trust Services

Summary

Chapter 15: RFID Security: Attacking the Backend

Introduction

Overview of Backend Systems

Data Attacks

Data Flooding

Problem 1

Solution 1

Problem 2

Solution 2

Purposeful Tag Duplication

Problem

Solution

Spurious Events

Problem

Solution

Readability Rates

Problem

Solution

Virus Attacks

Problem 1 (Database Components)

Problem 2 (Web-based Components)

Problem 3 (Web-based Components)

Solution 1

Problem 4 (Buffer Overflow)

Solution 4

RFID Data Collection Tool - Backend Communication Attacks

MIM Attack

Application Layer Attack

Solution

TCP Replay Attack

Solution

Attacks on ONS

Known Threats to DNS/ONS

ONS and Confidentiality

ONS and Integrity

ONS and Authorization

ONS and Authentication

Mitigation Attempts

Summary

Chapter 16: Management of RFID Security

Introduction

Risk and Vulnerability Assessment

Risk Management

Threat Management

Summary

Index

The users who browse this book also browse


No browse record.