advanced security and mobile networks w.buchanan (1)bill/asmn/unit10_rfid.pdfw.buchanan (2) unit 10:...

42
W.Buchanan (1) Unit 10: Location and ID Advanced Security and Mobile Networks

Upload: buikien

Post on 10-Mar-2018

218 views

Category:

Documents


1 download

TRANSCRIPT

W.Buchanan (1)

Uni

t 10:

Loc

atio

n an

d ID

Advanced Security and Mobile Networks

W.Buchanan (2)

Uni

t 10:

Loc

atio

n an

d ID

Location-basedtravel information

Location-basedtravel updates

Taggingprisoners

Stock control

Location-based map services

Automatedtolls Pet/child

tracking

Emergency servicesLocation-basedstatistics Military Information

Some Applications of Location-based Services

W.Buchanan (3)

Uni

t 10:

Loc

atio

n an

d ID

Tracking by GPS

A key factor in tracking isfor the system to automaticallydetect the object that it is tracking.

Solution: RFID

A key factor in tracking isfor the system to automaticallydetect the object that it is tracking.

Solution: RFID

Tracking by wireless transmitter

Tracking by mobilephone

Types of Tracking

W.Buchanan (4)

Uni

t 10:

Loc

atio

n an

d ID

RFID (Radio Frequency ID)Identifying Objects

Software Security

W.Buchanan (5)

Uni

t 10:

Loc

atio

n an

d ID

Frequencies used: less than135kHz, 13.56MHz, 860-930MHz, 2.45GHz, 5.8GHz

LFLF MFMF HFHF VHFVHF UHFUHF Microwave

Radio wave propagationFrom 50kHz to 2.5GHz

Microwave

LF radio AM radio FM radio TV signals Radar/ Satellite/Wireless

135kHz 13.56MHz(globally defined standard)

860-930MHz 2.45GHz

Propagate well over large distances Line-of-sight communications

Low range (<0.5m) Med range (1m) High range (5m) Med range (1m)

Low read rate High read rateLarge antenna Small antennaRelatively large Relatively small

Radio Spectrum

W.Buchanan (6)

Uni

t 10:

Loc

atio

n an

d ID

50kHz-2.5GHz

RF TagRF Reader

Automatedtolls Pet

tracking

RFID Applications

Stock control

Automatedcheckout

RemoteTelemetry(temperature, pressure,humidity, and so on).

Automatedpayments

ID cards

Anti-fraud

W.Buchanan (7)

Uni

t 10:

Loc

atio

n an

d ID

RF Reader

Electronic Product Code (EPC)- Information on product.- Manufacturer.- Unique identity.

Tags can be:- Read-only.- WORM (Write Once-Read Many)- Volatile Read/Write

Tag information

50kHz-2.5GHz

RF Tag

Automatedtolls

Stock control

Pet tracking

Automatedcheckout

W.Buchanan (8)

Uni

t 10:

Loc

atio

n an

d ID

RF Reader

Time: Description (EPC): Location:Temperature: Pressure:Humidity:etc.

Typical storage of details to the database

50kHz-2.5GHz

RF Tag

Automatedtolls

Pet tracking

Stock control

Automatedcheckout

W.Buchanan (9)

Uni

t 10:

Loc

atio

n an

d ID

RF TagRF Reader

50kHz-2.5GHz

Stock control

Microchip

Active Tags contain their own power supply

- these tend to be larger thanpassive tags

Coiled antenna

Active Tag

W.Buchanan (10)

Uni

t 10:

Loc

atio

n an

d ID

RF TagRF Reader

Stock control

Microchip

Passive Tags use the power Generate from the reader.

- these tend to be smaller thanactive tags

Radio powercoupled into tag

Coiled antenna

Passive Tag

W.Buchanan (11)

Uni

t 10:

Loc

atio

n an

d ID

Active tags: Larger, more reliable, more radio power, continuous transmission ofSignal. Larger range (<100m).

Passive tags: Smaller,less radio power. Lastlonger. Limited range (<5m)

Active location: This provides additional informationon the actual location of thetag.

Short-range: Require lesspower.

Long-range: Require morepower.

W.Buchanan (12)

Uni

t 10:

Loc

atio

n an

d ID

The main classes are:

Class Known as Memory Power Source Application0 EAS None Passive Ant-theft ID1 EPC Read -Only Any Identification2 EPC Read-Write Any Data logging3 Sensor Tags Read-Write Semi-Passive/Active Sensors4 Smart Dust Read-Write Active Ad Hoc networking

Class 0.These are factory programmed. Which have a simple tag which is preprogrammed with data, such as a simple ID number (EPC). The memory cannot be updated after it is manufactured. A typical application is EAS (electronic article surveillance) and in anti-theft devices. They are passive and only transmit when an antenna field is present.

Class 1. These are factory or user programmed, where they programmed once only, either a manufacture or by the user. A typical application is in ID badges.

Class 2. This type has a read-write type of memory, and is typically used for data loggers, as they contain a relatively large amount of memory space that can store data.

Class 3. These are used with on-board sensors, and monitor parameters such as temperature, pressure,and humidity. The power supply can be active or passive.

Class 4. These have integrated transmitters (and thus require active power), and can communicate with their neigbours and are thus used in ad-hoc networks.

Passive tags have a range of around 5 meters for UHF, while it can be over 100m for active tags.

Tag classes

W.Buchanan (13)

Uni

t 10:

Loc

atio

n an

d ID

Antenna is approx half the wavelength of the radio wave:

• 2.45GHz. Half wavelength: 0.06m (6 cm). • 900MHz. Half w/l: 0.16m (16 cm). • 13MHz. Half w/l: 11m.

Examples include:Low Frequency passive:• 4 to 5 ft. range with large tags(3.3 in disk)• 1 to 2 ft. range with small tag (1 in.disk)

High Frequency passive:· 19 to 23 in. range with credit size foil· 4 to 6 in. range with 1 in. disk

Low Frequency Active:· 8 to 12 ft. range with 3 in. disk

UHF passive:· 8 to 10 ft. range with credit card size foil (900 MHz)· 2 to 6 ft. range with 3 in. tag (2.4 GHz)·15 to 30 ft. range with 1.5 in. disk

UHF active:· 150 ft. range with 2 in. cube

Dipole

Monopole

Coverage of Different Types

Patch

Radio coverage

This can be reduced if the wire is wrapped around magnetic material

Radiocoverage

W.Buchanan (14)

Uni

t 10:

Loc

atio

n an

d ID

SubstrateThis can be materialssuch as paper, plastic,and so on.

AntennaMicrochip

Gold connection

Epoxycovering

Approximate Size: 95mm x 30mm Tag Type: ePC class 1 compliant Operating frequency: 915 MHz (902-928 MHz ) Read Range: Up to 5 meters Simultaneous ID of Tags: 200 tags per second Tag Power: RF Beam Powered (Passive) Memory Capacity: 96 bits Memory Type: WORM Antenna Dimensions: 13x134mm Orientation Sensitivity: Good Applications: General Purpose

Construction of the tag

W.Buchanan (15)

Uni

t 10:

Loc

atio

n an

d ID

Mastering Computing

Mastering Delphi

Bar codes use aUnique Product Code(UPC). The first one wason a pack of Wrigley's chewing gum on June 26, 1974.

Example Bar Codes

W.Buchanan (16)

Uni

t 10:

Loc

atio

n an

d ID

Bar code readers normally requirea line-of-sight transmission.

They must be viewable on the surfaceof an object.

Bar codes only contain manufacturer and product.

RFID do not require a line-of-sighttransmission.

RFID can be embedded intoa device, and thus more robust.

RFID can contain other Information, such as a uniqueID, manufacturing factory, and so on.

Bar codes v. RFID

W.Buchanan (17)

Uni

t 10:

Loc

atio

n an

d ID ONS (Object Name

Service)

Header. Defines the umber, type and length of all subsequent data. EPC Manager. Identifies the originating entity (manufacturer) of the object/item. Object Class. This is a tracking mechanism for specific groups such as sub-group ID. Object Identification Number. This uniquely identifies the object/item.

Header

0-7 bits

EPC Man.

8-35 bits

Full ID details

Electronic Product Code (EPC)

Object IDNumber

60-96 bits

Object Class

36-59 bits

00036EDE001 0000B1F 00035BFor example, EPC standard:(8bits, 28bits, 24bits, 36 bits)

EPC and ONS

W.Buchanan (18)

Uni

t 10:

Loc

atio

n an

d ID

The Internet then becomesan integrated system of objects:computers, cars, components, and, …

ONS

DNS

PML (Physical Markup Language)<xml><location> <x>1000</x> <y>2000</y></location><manufacturer>xyz fac </manufacturer><id>1234456</id><temperature>20</temperature?… etc

W.Buchanan (19)

Uni

t 10:

Loc

atio

n an

d ID

Reader(Senses tags)

Reader(Senses tags)

Savent(Processes

Tags)

Savent(Processes

Tags)

EPCInformation

Service

EPCInformation

Service

Internaldatabase

ONS(Root)

ONS(Cache)

Eventdata

Organisation

Links to externaldatabases

Static ONS: Maps EPC to Internet Address tofind information on product.

Dynamic ONS: Contains a mapping of currentand previous EPC details, in order for tracking purposes, such as product recalls.

EPC (Electronic Product Code) Architecture

W.Buchanan (20)

Uni

t 10:

Loc

atio

n an

d ID

Reader(Senses tags)

Reader(Senses tags)

Savent(Processes

Tags)

Savent(Processes

Tags)

EPCInformation

Service

EPCInformation

Service

ONS(Cache)

URI is converted into a DomainName

EPC in URI formaturn:epc:1.47400.11015.583865

URL of PML or WWW server such as:http://gillette.com/cgi-bin/pml.php

PML server

01 000000000000000000010 00000000000011000 000000000000000110010000)

Gillette Mach3 URI

11015.47400.1.onsroot.org

Object MAN ID

WWW server

EPC (Electronic Product Code) Architecture

W.Buchanan (21)

Uni

t 10:

Loc

atio

n an

d ID

Example of PML for sensor data<pmlcore:Sensor>

<pmluid:ID>urn:epc:1:124.162.37</pmluid:ID><pmlcore:Observation>

<pmlcore:DateTime>2002-11-06T13:04:34-06:00</pmlcore:DateTime><pmlcore:Data>

<pmlcore:Text>temp=22,24,25,22,22,23,22</pmlcore:Text></pmlcore:Data>

</pmlcore:Observation></pmlcore:Sensor>

W.Buchanan (22)

Uni

t 10:

Loc

atio

n an

d ID

Manufacture

S

Reader Reader

Readers track thecar in the factory

Reader senseswhen the car leaves the factory

Reader senseswhen the car arrives at the distribution centre

Distribution Centre

Reader

Reader

Reader

ReaderSalesCentre

Reader

S

S

SS

Reader sensesstorage at distribution centre

Reader sensessale

Enhancements to the Supply Chain

W.Buchanan (23)

Uni

t 10:

Loc

atio

n an

d ID

Manufacture

S

Reader Reader

Distribution Centre

Reader

Reader

Reader

ReaderSalesCentre

Reader

Product database

ServiceCentre

ReaderReliability info

Trackinginfo

Sales info

Trackinginfo

ReaderSecurity/Insurance Services

Security/fraudchecking

Stockcontrol

Enhancements to the Supply Chain

W.Buchanan (24)

Uni

t 10:

Loc

atio

n an

d ID

There are many security problems with RFID, such as:

• Obtaining information on the object.• Modifying the data on the object.• Copy the details on the object (to create a duplicate).

And can thus lead to:

• Industrial espionage.• Industrial sabotage. • Counterfeiting.

Security Problems

W.Buchanan (25)

Uni

t 10:

Loc

atio

n an

d ID

Sun Microsystemsat Linlithgow have invested heavily on a new facility to test RFID devices.

RFID Testing at Sun Microsystem, Linlithgow

W.Buchanan (26)

Uni

t 10:

Loc

atio

n an

d ID

A Few ApplicationsFrom Lego to M&S

Software Security

W.Buchanan (27)

Uni

t 10:

Loc

atio

n an

d ID

• Person Identification.• Food Production Control.• Blood Analysis Identification.• Water Analysis.• Refuse Collection Identification.• Timber Grade Monitoring.• Road Construction Material Identification.• Toxic Waste Monitoring.• Vehicle Parking Monitoring.• Pigeon Flight Monitoring.• Valuable Objects Insurance Identification.• Oil Pipe Identification.• Machine Tool Management• Gas Bottle Inventory Control• Duty Evasion• Asset Management• Stolen Vehicle Identification.• Production Line Monitoring.• Car Body Production• Parts Identification• Access Control• Beer Barrel Stock Control• Security Guard Monitoring

Source:http://www.korteks.com

A few examples of passive RFID applications

W.Buchanan (28)

Uni

t 10:

Loc

atio

n an

d ID

M&S Trail tagged men’s suits, shirts and ties with RFID tags.

The key factor was that the details only contained information on the product, andhad no information on the user, or tracked them. This is key in user adoption, as users are sceptical of technologies which could track them.

At the end of the trail they claimed 100% stock accuracy. Thus ensuring that the rightgoods where delivered where they were required.

One blue suit sold.reorder another!

Reader

Reader

Stock: 6 Blue, 1 Green

M&S Stock Control Trail

W.Buchanan (29)

Uni

t 10:

Loc

atio

n an

d ID S

At present, the RFID tag is thrown-away after sale.

Many organisations feel that RFID is a suspect technology which will allow organisations to track human movement.

M&S have detachable tabs, so the users never have any issues on their usage.

Tesco’s are also trailing the usage of RFID tags, such as this one on a DVD box.

Please retain this label for refund and exchange

Antenna

Detachable Tags at M&S

W.Buchanan (30)

Uni

t 10:

Loc

atio

n an

d ID

Gillette have bought over 500 milliontags for their products, as razors are seenas ‘high shrinkage’ goods, where theirproducts are stolen throughout the supplychain.

Gillette Wireless Tags

W.Buchanan (31)

Uni

t 10:

Loc

atio

n an

d ID

Possibility ofsmart shelves,which automaticallydetect products being taken.

System detectsnon-killed products

Tag is ‘killed’at the check-out

Wireless Sensors

W.Buchanan (32)

Uni

t 10:

Loc

atio

n an

d ID

RFID devices are being used in hospitals in the US to track and manage mobile assets. This currently tracks equipment, but is likely to involve the tracking on personnel, so that they can be traced, in emergencies.

Asset Management in Hospitals

W.Buchanan (33)

Uni

t 10:

Loc

atio

n an

d ID

Stolen motorbikes are oftenbroken up and sold as spares

ID Tags embeddedinto the metal of thecastings and components

W.Buchanan (34)

Uni

t 10:

Loc

atio

n an

d ID

ID Tags can be embeddedinto printed circuit boards,as these are commonly used in products.

It can thus be used to trackstolen goods.

Tracking PCB’s

W.Buchanan (35)

Uni

t 10:

Loc

atio

n an

d ID

Reader

Legoland Denmark have found that up to 1600 children can be reported lost in a single year. Thus they have implemented an active RFID system where children wear a bracelet which can be traced around the park. As they are active device there does not have to be many readers around. These use standard IEEE 802.11b communications (2.4GHz). The tag is 1.5inches by 2.5 inches, and is registered with the mobile phone of the parent. It uses triangulation to track children. The method is TDOA (Time Difference of Arrival) - see the previous unit.

The system system can be used for electronic passes, which automatically authenticate users.

Reader

Reader

SMS message: Where is my child?

SMS Message: Next to the Tiger!

Tracker in Legoland

W.Buchanan (36)

Uni

t 10:

Loc

atio

n an

d ID

The LawFrom Business to Business and from Business to User

Software Security

W.Buchanan (37)

Uni

t 10:

Loc

atio

n an

d ID

SupplierSupplier ManufacturerManufacturer DistributionDistribution

SalesSales

Business-to-Business Tracking

With Business-to-BusinessRFID and location findingIs obviously of great benefit.

WAL*Mart now specify that suppliersshould fit RFID to their goods

ProductDatabase

B2B -Business-to-Business

W.Buchanan (38)

Uni

t 10:

Loc

atio

n an

d ID

SupplierSupplier ManufacturerManufacturer DistributionDistribution

SalesSales

ProductDatabase

By adding user details, companiescan find out about users, such aswhich shops theyshop-in, what productsthey buy, and so on.

UserDatabase

Business’s can data mine this information

Business-to-User Tracking

W.Buchanan (39)

Uni

t 10:

Loc

atio

n an

d ID

The legal system often takes a while for laws to be developed on new technologies, but it California it is now a law that prohibit businesses and libraries from using RFID tags attached to consumer products or using an RFID reader that could be used to identify an individual, unless:

“The information collected via RFID can only be in regard to items customers actually are buying, renting or borrowing. Information can't be collected on what customers may have picked up but put back prior to a transaction, on what they're wearing or on items they are carrying in a wallet or purse.”

Fred

Laws on the usage of RFID

Fred bought:

- Green car, Ford’s R Us, 3 Dec 2004.- Biscuits, Safeway, 4 Dec 2004.- Cake, M&S, 4 Dec 2004.

Fred looked at a Red car.Fred picked up Cheese.

W.Buchanan (40)

Uni

t 10:

Loc

atio

n an

d ID

Conductive Inks

Copper antennas arefairly large, even thoughthe RFID chips are small

HELLOThese could be replacedby conductive inks, whichcould act as antennas.

W.Buchanan (41)

Uni

t 10:

Loc

atio

n an

d ID

Batteries can betrickled charged

Thin-film Polymer Batteries

Substrate

Wireless range extendedIntegrated thin-filmpolymer batteries,reduce size of active devices, and range

W.Buchanan (42)

Uni

t 10:

Loc

atio

n an

d ID

ConclusionsThe use of RFID is a definite improvement over the bar code, as it:

- Allows for more information.- Integrates better with the Internet.- Can be reprogrammed.

But… the security of it need to be sorted. In most cases it is, butit is user doubts which must be overcome (as with any new technology). It is unlikely that users will be keen on items whichcan be tracked that they own, unless they feel it is of benefit tothemselves.

The adopt is likely to track objects until sale, after which the tagis taken off.