Top Banner
Gaurov Narayanaswamy, Shesh Kumar Jagannatha and Daniel W. Engels Blocking Reader 15 April 2010 Slide 1 Handheld Readers Alien Readers Alien Readers Sirit Readers T agged Objects Blocking Envelope
18

Rfid2010 Presentation Final1

Jun 26, 2015

Download

Documents

gaurov

Presentation given at International IEEE RFID 2010 conference. For the accepted paper" Blocking Reader: Design and Implementation of a Passive UHF RFID Blocking Reader.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Rfid2010 Presentation Final1

Gaurov Narayanaswamy, Shesh Kumar Jagannatha and Daniel W. Engels

Blocking Reader 15 April 2010Slide 1

Handheld Readers

Alien Readers Alien Readers

Sirit Readers

Tagged Objects

Blocking Envelope

Page 2: Rfid2010 Presentation Final1

Blocking Reader 15 April 20102

Introduction• Passive UHF RFID.• Readers ,Tags and Back-end Information system• Tags have unique identifier.• Wirelessly communicates identifier• Frequency of operation 860-960 MHz.

Reader

Back-end Information System

Reader Antenna

Tags (Recall Excalibur, UPM, Alien Squiggle)

Page 3: Rfid2010 Presentation Final1

Blocking Reader 15 April 20103

Threats to Privacy and Security

[1] Ari Juels. Rfid security and privacy: A research survey. IEEE Journal on Selected Areas in Communication,, 24.

• RFID doesn’t require LOS.

• Privately owned Tags can

be read by any Readers.

• Snooping aids thieves and spies.

• RFID Technology advancing too fast.

• Security threat to Industry.

• Security threat when used in military. Picture [1]

Page 4: Rfid2010 Presentation Final1

Blocking Reader 15 April 20104

Previous Work:

• Blocker Tag [2]

• Killer Tag approach

• Faraday Cage approach

• Active Jamming approach

• Smart RFID Tag approach

- Hash-lock approach (Meta-ID)

- Re-encryption approach ( Bank notes)

- Silent Tree-Walking [3]

[2] Ari Juels , Ronald L. Rivest , Michael Szydlo, The blocker tag: selective blocking of RFID tags for consumer privacy, Proceedings of the 10th ACM conference on Computer and communications security, October 27-30, 2003, Washington D.C., USA[3] S. A. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In First International Conference on Security in Pervasive Computing, 2003.

Page 5: Rfid2010 Presentation Final1

Blocking Reader 15 April 20105

Motivation

• Personal Privacy can be preserved by a simple device.

• Scope for Low-Cost UHF RFID Reader.

• Implementation of this on a persons body.

• Tag Capture.

• Multiple Tags.

• Communication Interface approach.

• Protocol approach.

Page 6: Rfid2010 Presentation Final1

Blocking Reader 15 April 20106

ISO 180006-C Gen 2 Protocol.

Figure: Single Tag Reply [3]

Page 7: Rfid2010 Presentation Final1

Blocking Reader 15 April 20107

Theory of Tag capture:

• Power:

Tags responds to higher

power

• Frequency Hopping:

Tuned Frequency

• Slot Duration:

Time between two slots

Page 8: Rfid2010 Presentation Final1

Blocking Reader 15 April 20108

Theory of Tag capture for a typical Passive Tag:

• Tags choose higher power

• Filter takes time to switch

to different frequency.

Page 9: Rfid2010 Presentation Final1

Blocking Reader 15 April 20109

Implementation of Blocking Reader:

Page 10: Rfid2010 Presentation Final1

Blocking Reader 15 April 201010

Complete circuit diagram

Page 11: Rfid2010 Presentation Final1

Blocking Reader 15 April 201011

Performance of Blocking Reader:

Sniffer Blocking Reader

Squiggle Tag

Distance D

Height1.4 m

Tag Reply:

• Reply seen for a alien squiggle Tag.• Used NI Sniffer.

Page 12: Rfid2010 Presentation Final1

Blocking Reader 15 April 201012

Performance of Blocking Reader cont..:

Vapc = 1.6 (Power= 9dBm)

Page 13: Rfid2010 Presentation Final1

Blocking Reader 15 April 201013

Performance of Blocking Reader cont..:Sirit Reader

Blocking Reader

Squiggle Tag

1.5 mts Distance D

Height1.4 mts

Maximum Blocking distance when an unauthorized Sirit Reader is present

Vapc = 2.6 (Power= 21dBm)Vapc = 1.6 (Power= 9dBm)

Page 14: Rfid2010 Presentation Final1

Blocking Reader 15 April 201014

Performance of Blocking Reader cont..:Blocking Range results comparing with Friis Power

Page 15: Rfid2010 Presentation Final1

Blocking Reader 15 April 201015

Performance of Blocking Reader cont..:

Sirit Reader

Blocking Reader

Squiggle Tag

2.1 mts

Distance D

Height1.4 mts

θ

Blocking Envelope: Around the Tag

Page 16: Rfid2010 Presentation Final1

Blocking Reader 15 April 201016

Blocking Reader application:

Sirit Reader

Squiggle Tag

Height1.4 mts

θHuman Body

Distance D2.7

mts

Blocking Reader

Performance of BR in presence of Human

Page 17: Rfid2010 Presentation Final1

Blocking Reader 15 April 201017

Conclusions:

Blocking Reader creates blocking envelope around the Tag preserving it from being read from any unauthorized Reader.

Blocking Reader is designed to be FCC compliant.

Blocking Reader also creates an envelope around a person wearing it, preserving privacy of his Tags.

Blocking Reader works by capturing the Tags.

Blocking Reader is a Low-Cost Device.

Any Reader can be used as Blocking Reader.

Maximum Blocking envelope is 1.4 mts

Page 18: Rfid2010 Presentation Final1

Blocking Reader 15 April 201018

Thank You

Any Questions ??