21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.4. Related Device Types 29<br />

ports are be<strong>in</strong>g tagged. S<strong>in</strong>ce RFID tags can be accessed through a concealed,<br />

wireless connection, people can be potentially tracked us<strong>in</strong>g the tags that are<br />

embedded <strong>in</strong> their cloth<strong>in</strong>g and other personal items. By associat<strong>in</strong>g the identifiers<br />

of RFID tags with the identity of a person, this person can be recognized<br />

whenever one of the tags is detected. This leads to even better track<strong>in</strong>g capabilities<br />

than with biometric recognition techniques, as not even physical contact<br />

or a good view on a person is necessary <strong>for</strong> recognition.<br />

Consequently, there are different views on RFID security. The first is from<br />

the system operator’s po<strong>in</strong>t of view, where RFID tags are used as authentication<br />

tokens. Here, security concerns exist regard<strong>in</strong>g the clonability of tags, or other<br />

manipulations that would yield illegitimate authorization. Also, the channel<br />

between the reader device and the tag is a potential target <strong>for</strong> attacks. These<br />

security issues are equivalent to those concern<strong>in</strong>g the use of smart cards. As<br />

the circuitry of an RFID tag is often much simpler than that of a smart card,<br />

novel techniques are researched that offer certa<strong>in</strong> security guarantees.<br />

The second view on RFID security regards the tag itself as a risk as it allows<br />

identification, and thus poses a potential threat to privacy. It is there<strong>for</strong>e crucial<br />

to restrict access to the tag <strong>in</strong> such a way that the user has to agree on its<br />

use be<strong>for</strong>e it can be accessed. For passports, this may be achieved by us<strong>in</strong>g a<br />

metallic cover that shields the tag as long as the passport is closed. Another<br />

approach is the use of a key that is required to access the data stored on the<br />

RFID tag. This key can be determ<strong>in</strong>ed from the optically readable data that is<br />

pr<strong>in</strong>ted <strong>in</strong> the passport (personal data of the passport holder, passport number).<br />

Thus, a reader device with optical access to the passport can also read the data<br />

from the RFID tag [67]. Whenever the passport is handed to somebody, <strong>for</strong><br />

example a customs officer, the right to access the RFID tag is implicitly granted.<br />

2.4.3 Embedded Computers<br />

As mentioned above, embedded microprocessors make up <strong>for</strong> the majority of<br />

all microprocessor sales. It is estimated that on average a household <strong>in</strong> the U.S.<br />

owns approximately 60 microcontrollers [76]. Most of these computers are not<br />

networked <strong>in</strong> any way. They simply function as controllers <strong>for</strong> their conta<strong>in</strong><strong>in</strong>g<br />

device, <strong>for</strong> <strong>in</strong>stance a car eng<strong>in</strong>e or a wash<strong>in</strong>g mach<strong>in</strong>e. Mak<strong>in</strong>g such devices<br />

connected to their environment to other devices has just been started. One such<br />

example is the registration of trucks on highways <strong>in</strong> Germany <strong>for</strong> road bill<strong>in</strong>g,<br />

where so-called “on-board-units” that are <strong>in</strong>stalled <strong>in</strong> trucks communicate with<br />

by-road stations <strong>for</strong> automated bill<strong>in</strong>g and can also be queried by mobile check<strong>in</strong>g<br />

teams [29].

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!