23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

xiv<br />

List of Figures<br />

Figure 2.1 Block diagram of typical <strong>RFID</strong> system .......................................................... 11<br />

Figure 2.2 How does <strong>RFID</strong> work? ................................................................................... 11<br />

Figure 2.3 <strong>RFID</strong> <strong>Tag</strong>s ...................................................................................................... 12<br />

Figure 2.4 Basic Components of <strong>RFID</strong> <strong>Tag</strong> .................................................................... 12<br />

Figure 2.5 Handheld <strong>RFID</strong> reader ................................................................................... 15<br />

Figure 2.6 <strong>RFID</strong> reader structure ..................................................................................... 16<br />

Figure 2.7 EPCglobal Standards Overview ..................................................................... 18<br />

Figure 2.8 The Data Protocol standards of ISO/IEC 15961,ISO/IEC 15962 and the Air<br />

Interface standards of ISO/IEC 18000 ........................................................... 20<br />

Figure 2.9 <strong>RFID</strong> technology standards and frequency bands .......................................... 21<br />

Figure 2.10 Memory layout of EPC Gen 2 <strong>Tag</strong> ............................................................... 23<br />

Figure 2.11 Data transfer techniques between <strong>RFID</strong> Tad and Reader ............................. 24<br />

Figure 2.12 Enterprise sub-system <strong>in</strong> <strong>RFID</strong> system architecture ..................................... 26<br />

Figure 2.13 Information Functions of <strong>RFID</strong> Middleware Software ................................ 27<br />

Figure 2.14 Classification of <strong>RFID</strong> Threats ..................................................................... 33<br />

Figure 2.15 Bus<strong>in</strong>ess System <strong>RFID</strong> Security Risks ......................................................... 34<br />

Figure 3.1: <strong>RFID</strong> Malware Test Platform ........................................................................ 39<br />

Figure 3.2: Scenario 1 illustration .................................................................................... 42<br />

Figure 3.3: Scenario 2 illustration .................................................................................... 43<br />

Figure 3.4: SQL Server forensic methodology ................................................................ 45<br />

Figure 3.5: Model of Computer Live <strong>Forensics</strong> Based on Physical Memory Analysis .... 51<br />

Figure 3.6: <strong>Digital</strong> <strong>Forensics</strong> <strong>Investigation</strong> Fundamentals .............................................. 53<br />

Figure 3.7: Process flow between the roles <strong>in</strong> digital forensics <strong>in</strong>vestigation ................. 55<br />

Figure 3.8: Research Phases ............................................................................................ 65<br />

Figure 3.9: Data Map ....................................................................................................... 68<br />

Figure 3.10: The Bus<strong>in</strong>ess System Entity Composition .................................................. 69<br />

Figure 3.11: Test-Station Setup ....................................................................................... 70<br />

Figure 3.12: An Example of Us<strong>in</strong>g the Trusted md5deep Hash<strong>in</strong>g Algorithm<br />

for Preservation ............................................................................................ 75<br />

Figure 4.1: Error encountered dur<strong>in</strong>g the tag was read by RIFD scanner ........................ 84<br />

Figure 4.2: Error encountered dur<strong>in</strong>g Tripwire for Servers set up ................................... 84

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!