16.11.2012 Views

Untitled

Untitled

Untitled

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The application of RFID as anti-counterfeiting technique 159<br />

In the following section, we introduce a non-formal attack model that helps to<br />

structure the requirement specification and the design phase. Thereafter, we<br />

outline and critically assess four principal solution concepts and show a possible<br />

migration path.<br />

12.2 The use of RFID to avert counterfeit trade<br />

The specification of auto-ID-based anti-counterfeiting technologies is strongly<br />

influenced by security-related requirements as well as by the design parameters<br />

which stem from an integration in the desired production and inspection settings;<br />

both aspects are discussed below.<br />

The attack model<br />

A critical design parameter of anti-counterfeiting technologies is the desired level<br />

of security. Attack models allow structuring of the requirement analysis. In<br />

cryptography, such models usually take the form of an ‘‘experiment,’’ a program<br />

that intermediates communications with a fictional adversary, and a runtime<br />

environment containing the system components (often referred to as oracles) [3].<br />

Security models have to accurately reflect real-world threats (i.e. the capabilities of<br />

illicit actors) as well as the actual system characteristics. With respect to RFID,<br />

appropriate models should address not only the top-layer protocols, but also the<br />

basic characteristics of RFID transponders down to the bit level. The latter may<br />

lead to less formal descriptions but is necessary in order to capture relevant threat<br />

scenarios like power analyses (and other side-channel attacks) and destructive<br />

reengineering tests. Therefore, the attack model outlined below consists of a nonformal<br />

description of the system characteristics and the capabilities of the illicit<br />

actors as well as the identification and evaluation of the – partly novel – attack<br />

scenarios.<br />

System capabilities<br />

Low-cost RFID transponders are limited with respect to their maximum gate<br />

count (as the chip size influences transponder cost), the available energy (due to<br />

the restrictions on transmitting power of readers, the size of the antenna, and the<br />

considerable distance between tag and reader devices which is often required), and<br />

the frequency spectrum. This ultimately results in limited computational power,<br />

confines the memory size and communication bandwidth, and hampers the integration<br />

of sophisticated pseudo-random-number generators or sensors against<br />

hardware attacks. Strong public key cryptography systems, for example, are still<br />

out of scope for low-cost RFID transponders.<br />

Another important characteristic of RFID results from the radio connection<br />

between tag and reader. Connectivity is connectionless and communication is

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!