Handout 6
Handout 6
• SAP
• Microsoft
• Oracle
RFID Middleware
1
Sun’s RFID Software Architecture
2
Sun’s Event Manager
3
Sun’s Information Server
4
5 SAP
APPLICATION INTERROGATOR RF TAG
DEVICE
RESPONSES
RFID-Based Exploits
8
• Buffer Overflows
– RFID tags are limited to 1024 bits or less.
– However, commands like 'write multiple blocks' from ISO-15693 can
allow a resource-poor RFID tag to repeatedly send the same data
block, with the net result of filling up an application-level buffer.
– Meticulous formatting of the repeatedly sent data
– An attacker can also use contactless smart cards, which have a larger
amount of available storage space.
– An attacker can really blow RFID middleware's buffers away, by using
a resource rich actively-powered RFID tag simulating device, like the
RFID Guardian
RFID-Based Exploits
9
• Code Insertion
– Malicious code can be injected into an application
by an attacker, using any number of scripting
languages including VBScript, CGI, Java, JavaScript,
and Perl
RFID-Based Exploits
10
• SQL injection
– SQL injection is a type of code insertion attack that tricks a
database into running SQL code that was not intended.
– Attackers have several objectives:
• They might want to enumerate (map out) the database structure.
Then, the attackers might want to retrieve unauthorized data, or
make equally unauthorized modifications or deletions.
• Databases also sometimes allow DB administrators to execute
system commands. A system command can be used to attack the
system
RFID-Based Exploits
11
• Worm is a program that self-propagates across a network,
exploiting security flaws in widely-used services
• A worm is distinguishable from a virus in that a worm does
not require any user activity to propagate
• Worms usually have a payload, which performs activities
ranging from deleting files, to sending information via email,
to installing software patches
• One of the most common payloads for a worm is to install a
“backdoor” in the infected computer, which grants hackers
easy return access to that computer system in the future.
RFID-Based Worms
12
• One can develop RFID based viruses using SQL
language.
• The SQL data can be transmitted to a system
via an RFID tag
RFID-Based Viruses
13
64 and 96 bit EPC tags have been defined
EPC Tags
14
EPC Network
Manufacturer Retailer
Synt
ax 4th level 3rd level 2nd level Top level
1 Dom
ain ds . vnds . verisign . com
Name
Manufacturer
EPC 18559 . 47400 . onsepc
Retailer . com
1. EPC lifecycle begins when a Manufacturer tags the product
Manufacturer ID identifies supplier as Gillette
Object (product) Class identifies as Mach 3 razor (12 pk)
Manufacturer Retailer
Manufacturer Retailer
7 Retailer
Application
Manufacturer Retailer
Retailer
Application
Manufacturer Retailer
Regulations
21
In Europe, it is illegal to dispose of boxes with RFID tags because of the possibility of
damaging sensitive recycling machinery. Potential health risks are associated with the
Electromagnetic Field surrounding RFID tags; every country has specific regulations
regarding this concern.
Regulations
22
The following is a list of many standards that apply to RFID technology:
ISO 11784 & 11785 - These standards regulate the Radio frequency identification of
animals in regards to Code Structure and Technical concept
ISO 14223/1- Radio frequency identification of Animals, advanced transponders - Air
interface
ISO 10536 - Close coupled cards
ISO 14443 - Proximity cards
ISO 15693 - Vicinity cards
ISO 18000 - RFID for item Management; Air Interface
EPC Global
Regulations Standards
23
One of the major RFID security concerns is the threat of illegal tracking:
• tags could be read from a distance without the owner’s
knowledge, leading to the disclosing of location or other
sensitive information contained in the RFID tag’s
memory
Physical Materials
Components and sub-assemblies
Products
Containers
Physical carriers
People
Locations
Documents and other forms information carrier
……….virtually anything tangible that is part of a business process.
This is the opportunity………
RFID Items
26
Privacy & Security as
Primary Design Requirements
Designers, Manufacturers and users of RFID technology
should address the privacy and security issues as part of its
original design. Rather than retrofitting RFID systems to
respond to privacy and security issues, it is much preferable
that security should be designed in from the beginning.
RFID Privacy
27
Consumer Transparency
But……
RFID Privacy
28
Technology Neutrality
RFID Privacy
29
Some achievements based on the fact that the man
can also draw the right conclusions from false
premises. The computer does not create it.
[Lothar Schmidt]
Rationalization potential
30
ERP EAI-Middleware
MES
SCM
Auto-ID-Infrastructure
GPS
Process level
CRM Tracking RFID Barcode
& Tracing
Hitachi 2001
RFID Tag with 0.4mm² RFID with GPS-Coupling
RFID-Tags
32