3 Security Threats for RFID Systems
Total Page:16
File Type:pdf, Size:1020Kb
FIDIS Future of Identity in the Information Society Title: “D3.7 A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (RFID)” Author: WP3 Editors: Martin Meints (ICPP) Reviewers: Jozef Vyskoc (VaF) Sandra Steinbrecher (TUD) Identifier: D3.7 Type: [Template] Version: 1.0 Date: Monday, 04 June 2007 Status: [Deliverable] Class: [Public] File: fidis-wp3-del3.7.literature_RFID.doc Summary In this deliverable the physical properties of RFID, types of RFID systems basing on the physical properties and operational aspects of RFID systems are introduced and described. An overview on currently know security threats for RFID systems, countermeasures and related cost aspects is given. This is followed by a brief overview on current areas of application for RFID. To put a light on status quo and trends of development in the private sector in the context of RFID, the results of a study carried out in 2004 and 2005 in Germany are summarised. This is followed by an overview on relevant standards in the context of RFID. This deliverable also includes a bibliography containing relevant literature in the context of RFID. This is published in the bibliographic system at http://www.fidis.net/interactive/rfid-bibliography/ Copyright © 2004-07 by the FIDIS consortium - EC Contract No. 507512 The FIDIS NoE receives research funding from the Community’s Sixth Framework Program FIDIS D3.7 Future of Identity in the Information Society (No. 507512) Copyright Notice: This document may not be copied, reproduced, or modified in whole or in part for any purpose without written permission from the FIDIS Consortium. In addition to such written permission to copy, reproduce, or modify this document in whole or part, an acknowledgement of the authors of the document and all applicable portions of the copyright notice must be clearly referenced. The circulation of this document is restricted to the staff of the FIDIS partner organisations and the European Commission. All information contained in this document is strictly confidential and may not be divulged to third parties without the express permission of the partners. All rights reserved. PLEASE NOTE: This document may change without notice – Updated versions of this document can be found at the FIDIS NoE website at www.fidis.net. [Deliverable], Version: 1.0 Page 2 File: fidis-wp3-del3.7.literature_RFID.doc FIDIS D3.7 Future of Identity in the Information Society (No. 507512) Members of the FIDIS consortium 1. Goethe University Frankfurt Germany 2. Joint Research Centre (JRC) Spain 3. Vrije Universiteit Brussel Belgium 4. Unabhängiges Landeszentrum für Datenschutz Germany 5. Institut Europeen D'Administration Des Affaires (INSEAD) France 6. University of Reading United Kingdom 7. Katholieke Universiteit Leuven Belgium 8. Tilburg University Netherlands 9. Karlstads University Sweden 10. Technische Universität Berlin Germany 11. Technische Universität Dresden Germany 12. Albert-Ludwig-University Freiburg Germany 13. Masarykova universita v Brne Czech Republic 14. VaF Bratislava Slovakia 15. London School of Economics and Political Science United Kingdom 16. Budapest University of Technology and Economics (ISTRI) Hungary 17. IBM Research GmbH Switzerland 18. Institut de recherche criminelle de la Gendarmerie Nationale France 19. Netherlands Forensic Institute Netherlands 20. Virtual Identity and Privacy Research Center Switzerland 21. Europäisches Microsoft Innovations Center GmbH Germany 22. Institute of Communication and Computer Systems (ICCS) Greece 23. AXSionics AG Switzerland 24. SIRRIX AG Security Technologies Germany [Deliverable], Version: 1.0 Page 3 File: fidis-wp3-del3.7.literature_RFID.doc FIDIS D3.7 Future of Identity in the Information Society (No. 507512) Versions Version Date Description (Editor) 0.1 22.08.06 • Initial Draft (Martin Meints, ICPP). Contributions written by Pavel Rotter (IPTS, chapter 3), Martin Meints (ICPP, chapter 4) and Sven Wohlgemuth (ALU-FR, chapter 5) integrated. 0.2 08.10.06 • Introduction (Martin Meints, ICPP) and large parts of chapter 2 (Mark Gasson, Reading University) integrated 0.3 26.10.06 • Revised version of chapter 3 (Pavel Rotter, IPTS) integrated 0.4 25.02.07 • Chapter 2 revised (Mark Gasson) 0.5 12.03.07 • Chapter 6 added (Markus Hansen, ICPP) 0.6 04.04.07 • Integrative editing (Marit Hansen, Martin Meints, ICPP) 0.7 14.05.07 • Remarks from the reviewers and updated versions from the contributors integrated 1.0 14.05.07 • Final Version of the document (V 1.0) [Deliverable], Version: 1.0 Page 4 File: fidis-wp3-del3.7.literature_RFID.doc FIDIS D3.7 Future of Identity in the Information Society (No. 507512) Foreword FIDIS partners from various disciplines have contributed as authors to this document. The following list names the main contributors for the chapters of this document: Chapter Contributor(s) 1 (Executive Martin Meints (ICPP) Summary) 2 (RFID) Mark Gasson (Reading University) 3 (Security Threats) Pavel Rotter (IPTS), special review by Simone Fischer-Hübner (KU) 4 (Areas of Martin Meints (ICPP) Application) 5 (Study: RFID in Daniel Gille, Jens Strüker and Sven Wohlgemuth (ALU-FR) Germany) 6 (Standards) Markus Hansen (ICPP) 7 Summary Martin Meints (ICPP), Mark Gasson (Reading University) 8 (References) All authors 9 (Bibliography) Günter Karjoth (IBM-ZRL) 10 (Abbreviations) All authors [Deliverable], Version: 1.0 Page 5 File: fidis-wp3-del3.7.literature_RFID.doc FIDIS D3.7 Future of Identity in the Information Society (No. 507512) Table of Contents 1 Executive Summary ......................................................................................................... 8 2 Radio Frequency IDentification (RFID) ........................................................................ 9 2.1 Physical properties..................................................................................................... 9 2.2 Types of RFID systems............................................................................................ 11 2.2.1 Frequencies and range...................................................................................... 12 2.2.2 Power supply.................................................................................................... 13 2.2.3 Data rate........................................................................................................... 14 2.2.4 Operation type.................................................................................................. 14 2.3 RFID systems ........................................................................................................... 14 2.3.1 Tags .................................................................................................................. 15 2.3.2 Readers............................................................................................................. 15 2.3.3 Backend systems .............................................................................................. 16 3 Security threats for RFID systems................................................................................ 17 3.1 Introduction .............................................................................................................. 17 3.2 Commonly discussed security threats for RFID systems......................................... 18 3.2.1 Security threats for the tag ............................................................................... 18 3.2.2 Security threats for the air interface ................................................................. 21 3.2.3 Security threats for the reader .......................................................................... 23 3.2.4 Security threats for the whole system .............................................................. 24 3.3 Conclusions .............................................................................................................. 25 4 Areas of application ....................................................................................................... 28 4.1 Access management ................................................................................................. 28 4.2 Tracking of goods and RFID in retail ...................................................................... 28 4.3 Tracking of persons and animals.............................................................................. 29 4.4 Toll collection and contactless payment .................................................................. 29 4.5 Machine readable travel documents......................................................................... 29 4.6 Other applications.................................................................................................... 30 4.6.1 Smart dust......................................................................................................... 30 4.6.2 Location Based Services .................................................................................. 30 5 Study: RFID in Germany .............................................................................................. 31 5.1 Survey: methodology and standard values............................................................... 31 5.2 Status quo and chances of using RFID..................................................................... 32 5.2.1 Current and future distribution of RFID .......................................................... 32 5.2.2 Scale of investment .........................................................................................