• No results found

CMS - CISUC - Universidade de Coimbra

N/A
N/A
Protected

Academic year: 2021

Share "CMS - CISUC - Universidade de Coimbra"

Copied!
18
0
0
Show more ( Page)

Full text

(1)

(c) Carlos Bento et al., RFID Technologies

1

CMS - CISUC - Universidade de Coimbra

Carlos Lisboa Bento

Francisco Câmara Pereira

Pedro Fonseca

RFID Technologies Avances Tecnológicos para la Sociedad Digital UEM April 14-18

Contents

o

RFID: An Introduction

o

Security Issues

o

Privacy Issues

o

Steps for Development of a Medium Project

o

Applications

o

A Practical Example

o

Our tags

(2)

(c) Carlos Bento et al., RFID Technologies

RFID: An Introduction

3

Radio Frequency IDentification

Dedicated Short Range Communication (DSRC)

Designates a range of technologies that use radio waves to automatically

identify goods or people

An RFID system consists of two sides:

Reader

Antenna

Transceiver

Processing device

Tag

Radio Frequency circuitry

Information to be transmitted

Reader

Antenna

Transceiver

Processing device

Tag

Radio Frequency circuitry

(3)

(c) Carlos Bento et al., RFID Technologies

RFID: An Introduction

5

Passive Tag

Antenna signal

feeds power to

the tag

It then transmits its information to the reader

Active Tag

The tag has its own on-board power supply

It becomes a relatively self-sufficient unit

(own memory, sensors,...)

(4)

(c) Carlos Bento et al., RFID Technologies

RFID: An Introduction

7

RFID: An Introduction

Frequency

LF

125-134KHz

13.56MHz

HF

88-108MHz

VHF

860-960MHz

UHF

1.6-30GHz

MW

Reflection

Absorption

No

Low

High

Very High

Very Very

High

Atmospheric

Interference

No

High

Low

Very Low

No

Electrical

Interference

Very High

High

Medium

Low

Very Low

Reading

Distances

< 2m

< 1m

1-100m

1-100m

1-300m

Band Wide

1-10KB/s

1-3KB/s

1-20KB/s

0.1-10MB/s

0.1-10MB/s

Pos

Low Price/

Lower obfusc

and Rd Speed

Medium Dist

Long Dist and High Rd Speed

Cons

Reading

Speed

Price Higher

than LF

Expensive Hardware

Typical

(5)

(c) Carlos Bento et al., RFID Technologies

RFID: An Introduction

9

Antennas

A - Wall/Desktop antenna

B - HF antenna

C - Portal antenna

Range shape is also an issue.

Contents

o

RFID: An Introduction

o

Security Issues

o

Privacy Issues

o

Steps for Development of a Medium Project

o

Applications

o

A Practical Example

o

Our tags

(6)

(c) Carlos Bento et al., RFID Technologies

Security Issues

11

Radio Frequency Absorber

Disable the tag from being read (e.g. involve it in an aluminum sheet)

Spoofing

Produce faking information for the reader

Inserting

Insert commands in memory areas that result into bad behaviour of the tag

Replay

Save a valid signal from the tag and produce a ghost signal

DoS

Denial of Service

Back-end

Produce attacks in the back-end of the system

Memory overflow

Change the memory size parameters in the tags to produce a memory

overflow error

Contents

o

RFID: An Introduction

o

Security Issues

o

Privacy Issues

o

Steps for Development of a Medium Project

o

Applications

o

A Practical Example

o

Our tags

(7)

(c) Carlos Bento et al., RFID Technologies

Privacy Issues

13

Destroy the tag (e.g. destroy the antenna)

Reduce tag performance (e.g. cut part of the antenna)

Create a Faraday Cage

Privacy Issues

Signal Interference

Information Encryption

Re-encryption

(8)

(c) Carlos Bento et al., RFID Technologies

Contents

o

RFID: An Introduction

o

Security Issues

o

Privacy Issues

o

Steps for Development of a Medium Project

o

Applications

o

A Practical Example

o

Our tags

o

Programming in C#

15

Development Steps

(9)

(c) Carlos Bento et al., RFID Technologies

Contents

o

RFID: An Introduction

o

Security Issues

o

Privacy Issues

o

Steps for Development of a Medium Project

o

Applications

o

A Practical Example

o

Our tags

o

Programming in C#

17

Applications

(10)

(c) Carlos Bento et al., RFID Technologies

Applications

19

(11)

(c) Carlos Bento et al., RFID Technologies

Applications

21

(12)

(c) Carlos Bento et al., RFID Technologies

Applications

23

TOUAKI (SU 2006/7)

Contents

o

RFID: An Introduction

o

Security Issues

o

Privacy Issues

o

Steps for Development of a Medium Project

o

Applications

o

A Practical Example

o

Our tags

(13)

(c) Carlos Bento et al., RFID Technologies

A Practical Example

25

SRF55V10P RFID tags

128 pages of 8 bytes each

Three first pages (0 to 2) are protected

A Practical Example

SRF55V10P RFID tags

Aproximately 1Kb available

Syscan CF-Reader E04-40D

Interface with Compact Flash interface

13.56 frequency (HF)

Range of a few centimeter

Reads one tag at a time

Simple commands

Read, write, getID, getReaderVersion

(14)

(c) Carlos Bento et al., RFID Technologies

A Practical Example

27

PDA RFID reader

C#, Visual Studio CF environment

As with other interfaces (GPS, GSM, WiFi...), communication is made via

the "COM" ports

In this case, it is always Port #7

A Practical Example

Library available (in a DLL)

NetSerial.dll

using Intensecomp.RFIDCE

Class to access the reader, RFID: Comm

(15)

(c) Carlos Bento et al., RFID Technologies

A Practical Example

29

Reading an ID

Reading

reader version

String id = comm.GetTagID();

if (id != null && id.Length > 0)

MessageBox.Show(“ID:”+id);

else

{

MessageBox.Show("Etiqueta não encontrada!");

return;

}

if (comm.OpenPort())

{

string rv = comm.GetReaderVersion();

}

A Practical Example

Writing data

Hexadecimal representation

"KLMN“(ASCII) = "4B4C4D4E" (Hexa)

Each

char

(of a

string

), 8 bits, is represented by Hexadecimal symbols.

“K”=“4B”

private string StringToHexString(string source)

{

string result = string.Empty;

for (int i = 0; i < source.Length; i++)

{

int ch = source[i];

result += Convert.ToString(ch, 16);

}

(16)

(c) Carlos Bento et al., RFID Technologies

A Practical Example

31

Writing data

Example: Write the “email” on pages 4 to 6

String strpage = string.Empty;

String s1 = textBox1.Text;

String s1HEX = StringToHexString(s1) + new string('0',2000-

s1.Length);

for (int i = 0; i < 124; i++)

strpage = comm.WritePage(i + 3, s1HEX.Substring(i * 16,

16), 100);

//Três páginas (4 a 6) de 8 bytes dedicadas ao email (24

bytes)

for (int i = 4; i < 7; i++)

email = email + comm.ReadPage(i , 20);

A Practical Example

Reading data

Hexadecimal representation

The converse operation

private string HexStringToString(string source)

{

string result = string.Empty;

try

{

while (source.Length > 1)

{

string sub = source.Substring(0, 2);

char ch = (char)Convert.ToInt32(sub, 16);

if ((ch != (char)30) && (ch != (char)0))

result += ch;

source = source.Substring(2, source.Length - 2);

}

}

catch

{

}

(17)

(c) Carlos Bento et al., RFID Technologies

A Practical Example

33

Reading data

Reading email (pages 4 to 6)

String email = string.Empty;

//Três páginas (4 a 6) de 8 bytes dedicadas ao email

(24 bytes)

for (int i = 4; i < 7; i++)

email = email + comm.ReadPage(i , 20);

(18)

(c) Carlos Bento et al., RFID Technologies

RFID Technologies

References

Related documents

The purpose of this study is to analyze current juvenile fiction novels that portray bullying in a school setting, specifically looking at how the teachers and administrators

(3) Pain prevents me from lifting heavy weights, but I can manage light to medium weights if they are conveniently positioned.. (5) I can’t lift or carry anything

Dari hasil penelitian ini ditunjukkan bahwa, korelasi dari distribusi frekuensi kala ulang Log (Tr) dengan data curah hujan harian maksimum tahunan memberikan hasil yang jauh

Comparison of repeated XCT scans before and after HIPing, on worst-case samples with different geometries, confirmed that all internal porosity was shrunk to below the resolution limit

the author, a native of Concieiro in the district of vila Real, served on the Faculdade de medicina da universidade de Coimbra, was President of the Câmara municipal de Coimbra,

The pattern of evolution is estimated by fitting several models to the series, namely the models based on exponential, Gompertz and Logistic functions and Bass model as other

Our regressors include those used earlier in modeling (temporary) worker transitions into regular employment. They are augmented in the manner of Booth Francsconi,

In section 6, the analysis of the inuence of macroeconomic factor on default rate is performed in two stages: rst, regression on the integrated variables (unemployment and

Ant´ onio Teixeira Universidade de Aveiro, Portugal (Chair) Fernando Perdig˜ ao Universidade de Coimbra, Portugal Jorge Baptista Universidade do Algarve, Portugal. Renata Vieira

Manuel Palomar Universidad de Alicante, Spain Fernando Perdig˜ ao Universidade de Coimbra, Portugal Carlos Prolo Pontif´ıcia Universidade Cat´ olica do Rio. Grande do

Market  splitting  probability  decreases  with  increasing  ATC  (allowing  higher  flows  of  electricity  between  markets),  as  one  could  expect  by  the 

The cause is that the change to the protected volume by writing is stored in memory and the memory is consumed in relation to the size of written data (the total value of commit

• Program Memory = block of memory addresses allocated to program bytes – most instruction act on data and produce results stored in memory.. • Data Memory = block of memory

2008-03 Exchange Rate and Interest Rate Volatility in a Target Zone: The Portuguese Case - António Portugal Duarte, João Sousa Andrade &amp; Adelaide Duarte?. 2008-02

• If the two-stage thermostat changes the call from low heat to high heat, the integrated control module will immediately switch the induced draft blower, gas valve, and

IACBE International Assembly for Collegiate Business Education IASLIC Indian Association of Special Libraries and Information Centres IATLIS Indian Association of Teachers

We refer the reader to Laborie [184] for more details about CP optimizer for scheduling problems. The CP optimizer of Cplex 12.6 uses two concurrent search strategies by default:

Loading-case3 (displacement in the middle area of the plate upper surface) is useful to investigate the stress distribution correlated to a dis- placement applied on the

In conclusion, prophylactic oral calcium supplementation therapy reduces the incidence of symptomatic hypocalcemia and the need for calcium infusion 24 hours after total or

This is accomplished by expressing all figures in the statements as percentages of an important item such as total assets (in the balance sheet) or percentages

Correspondence and orders for medicines written in English will facilitate  execution of orders.. MRP

Sea water based heat pump system COP-heating = 3.0 COP-cooling = 10.0 Calculated yearly energy demand, kWh/m 2 BRA..

A single, mature and 12 smaller honey mesquite (Prosopisglan- duloso Ton. glandulosa) trees were partinlly excavated during 1986 to examine root distributional