23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

process (see Chalasani, Boppana, & Sounderpandian, 2005). As a result of the low<br />

cost and improved capabilities of <strong>RFID</strong> tags, the tags are employed <strong>in</strong> many<br />

applications. However, the employment of the tags does not only br<strong>in</strong>g benefits<br />

(such as ease of stock management, and the anti-counterfeit<strong>in</strong>g of medic<strong>in</strong>es) but<br />

also give the significant challenges and threats (see Section 2.4 <strong>in</strong> Chapter 2) to<br />

the bus<strong>in</strong>esses or organizations. As a consequence, the objective of this research is<br />

to <strong>in</strong>vestigate the presence of digital evidence after the theft of a <strong>RFID</strong> tagged<br />

stock item (SI) <strong>in</strong> a forensically sound manner.<br />

Hence, the purpose of this chapter is to present an overview of the problem<br />

or a gap <strong>in</strong> the current literature (Section 1.1), the motivation of the research<br />

(Section 1.2), a brief presentation of ma<strong>in</strong> research f<strong>in</strong>d<strong>in</strong>gs (Section 1.3) and the<br />

structure of thesis (Section 1.4).<br />

1.1 THE PROBLEM OR GAP IN CURRENT LITERATURE<br />

The potential for fraudulent <strong>in</strong>tervention <strong>in</strong>to a <strong>RFID</strong> system is established <strong>in</strong> the<br />

literature (Chapter 2; Section 2.4). Some researchers (for example: Ngai, Moon,<br />

Rigg<strong>in</strong>s, &Yi, 2008) provide a comprehensive 1995 – 2005 review relevant to<br />

<strong>RFID</strong> research. Other researchers (Jones, Hoare, Dontharaju, Shenchih, Fazekas,<br />

Ca<strong>in</strong>, & Mickle, 2006a) describe the evolution of <strong>RFID</strong> tag design and process<br />

time costs. In the manufacture of chips, the access to writ<strong>in</strong>g has become easier <strong>in</strong><br />

the <strong>in</strong>terest of lett<strong>in</strong>g retailers code their own chips. The benefit has however<br />

brought with it easier access for crim<strong>in</strong>als to write and rewrite over chips and<br />

hence change the values (<strong>in</strong>clud<strong>in</strong>g the null value) <strong>in</strong> a <strong>RFID</strong> system. One of the<br />

concerns for the <strong>RFID</strong> based retail environment is that as tags are made more user<br />

friendly, then the risk of attack grows. Hence, most of the previous literature<br />

reported the security risk concerned with <strong>RFID</strong> systems. Consequently, it is<br />

exposed that the requirement of forensic read<strong>in</strong>ess is necessary as there is<br />

potential for the fraudulent uses of <strong>RFID</strong> networks <strong>in</strong> commercial sett<strong>in</strong>gs.<br />

On the other hand, the digital forensic research <strong>in</strong>to small devices is a<br />

current growth area of knowledge (Harrill & Mislan, 2007). In the <strong>Digital</strong><br />

Forensic Research Workshop (DFRWS) road map for <strong>Digital</strong> Forensic research,<br />

small devices are aga<strong>in</strong> prioritised as key areas for research and growth of<br />

<strong>in</strong>vestigator knowledge (Palmer, 2001). Similarly, some researchers (Xiao, Yu,<br />

2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!