23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.0 INTRODUCTION<br />

Chapter 1 -<br />

Introduction<br />

The goal of ubiquitous comput<strong>in</strong>g, as described by Mark Weiser (1991 & 1993, p.<br />

75), is “mak<strong>in</strong>g many computers available throughout the physical environment,<br />

while mak<strong>in</strong>g them effectively <strong>in</strong>visible to the user”. However, the border l<strong>in</strong>e<br />

between the virtual and physical world has become faded as the technologies <strong>in</strong><br />

the age of ubiquitous comput<strong>in</strong>g (for examples; sensor networks, Global<br />

Position<strong>in</strong>g Systems, Radio Frequency Identification Systems and the like) enable<br />

those ubiquitous devices to connect with each other and to the Internet. Crime and<br />

crim<strong>in</strong>al activity has also flourished as a result of the new technology<br />

opportunities. The expos<strong>in</strong>g or theft of personal <strong>in</strong>formation, location and context<br />

<strong>in</strong>formation are the challenges related to security (Juels, 2005; Bhargava, 2006;<br />

Albrecht, 2006; D<strong>in</strong>g & Bo, 2008) and privacy <strong>in</strong> ubiquitous devices and<br />

technologies (Garf<strong>in</strong>kel, Juels, & Pappu, 2005; Anthony, Kotz, & Henderson,<br />

2007).<br />

Radio Frequency Identification (<strong>RFID</strong>) is one of the emerg<strong>in</strong>g and<br />

promis<strong>in</strong>g ubiquitous comput<strong>in</strong>g technologies (Roberts, 2006) applied <strong>in</strong> an<br />

extensive range of applications such as ticket<strong>in</strong>g (Nath, Reynolds, & Want, 2006),<br />

healthcare (Borriello, 2005), payment systems like Speedpass (Ha<strong>in</strong>es, 2006a),<br />

stock management systems <strong>in</strong> retail environments like Future Store <strong>in</strong> Germany<br />

(Ha<strong>in</strong>es, 2006b) and supply-cha<strong>in</strong> management <strong>in</strong> Wal-Mart (Sheng, Li, &<br />

Zeadally, 2008) and so on. <strong>RFID</strong>, which uses wireless communications<br />

technology, is convenient for automatic identification of items or objects by<br />

tagg<strong>in</strong>g them with <strong>RFID</strong> tags (Borriello, 2005) and is analogous to a bar code<br />

system (Roberts, 2006). Hence, the Read/Write <strong>RFID</strong> tags are used <strong>in</strong> the retail<br />

environment to tag stock with an ID that provides two utility values for the retailer,<br />

namely theft protection (for example, the tag is removed at the po<strong>in</strong>t of sale so the<br />

exit sensors do not alarm) and also mapp<strong>in</strong>g <strong>in</strong>to the retail database for price and<br />

stock control – this <strong>in</strong>cludes the po<strong>in</strong>t of sale (POS) process and <strong>in</strong>ventory control<br />

1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!