23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.3 FINDINGS OF THE RESEARCH<br />

The research summarizes f<strong>in</strong>d<strong>in</strong>gs relevant to the digital forensic <strong>in</strong>vestigation of<br />

a compromised <strong>RFID</strong> based stock management system. The f<strong>in</strong>d<strong>in</strong>gs from the<br />

<strong>in</strong>vestigation prove that the theft of SI has occurred <strong>in</strong> a <strong>RFID</strong> based retail system.<br />

Hence, the perpetrator could be identified and later be prosecuted accord<strong>in</strong>g to the<br />

court of law if more evidence (which are the limitations of this research; see<br />

Section 3.4 <strong>in</strong> Chapter 3) such as images from the Closed Circuit Television<br />

(CCTV) monitor<strong>in</strong>g system and the <strong>in</strong>terview evidence from human participants<br />

are taken <strong>in</strong>to consideration dur<strong>in</strong>g the <strong>in</strong>vestigation.<br />

In order to <strong>in</strong>vestigate the presence of digital evidence after theft of SI, a<br />

prototype of stabilized commercial retail environment us<strong>in</strong>g <strong>RFID</strong> stock<br />

management system is constructed <strong>in</strong> the laboratory accord<strong>in</strong>g to the proposed<br />

system design (Section 3.3.1). As part of the proposed system design, a<br />

customized <strong>RFID</strong> middleware software (source code can be seen <strong>in</strong> Appendix 4)<br />

is developed based on the Software Development Kit (SDK) of <strong>RFID</strong> reader’s<br />

manufactur<strong>in</strong>g company. The developed programme allows users to configure the<br />

<strong>RFID</strong> reader, to collect the tag data, and write the tag data to the backend database.<br />

Basically, it enables read<strong>in</strong>g and writ<strong>in</strong>g the tag data from the <strong>RFID</strong> scanner to the<br />

BIS SQL 2005 Server (and vice versa). By design, one real and one poisoned<br />

<strong>RFID</strong> Read/Write tags are also applied <strong>in</strong> a stabilized system. The Tripwire for<br />

Servers (Version 4.8) and Tripwire Managers (Version 4.8) are utilised to<br />

establish the basel<strong>in</strong>e of a stabilized/trusted system <strong>in</strong> operation. Hence, the<br />

previous studies such as compromis<strong>in</strong>g the backend database by us<strong>in</strong>g a <strong>RFID</strong> tag<br />

as an attack vector (Section 3.1.2), and the acquisition of backend SQL server<br />

artefacts methods (Sections 3.1.3 and 3.1.4) are replicated <strong>in</strong> this simulated<br />

research. Subsequently, SQL poison<strong>in</strong>g attack (Section 3.3.2) is <strong>in</strong>itiated via a<br />

fake tag to compromise the backend database of the stock management system<br />

and then each entity <strong>in</strong> the <strong>RFID</strong> BS (see Table 2.5 <strong>in</strong> Chapter 2) such as the tag,<br />

POS, scanner, and the backend SQL Server are <strong>in</strong>vestigated for evidence of the SI<br />

theft. Thus, the evidence is collected from the tag, the scanner, the POS and the<br />

backend SQL server. However, the ReaderLogExtraction tool (see Appendix 3) is<br />

developed based on SDK of <strong>RFID</strong> reader’s manufactur<strong>in</strong>g company <strong>in</strong> order to<br />

acquire bit-to-bit evidence data from the <strong>RFID</strong> reader’s memory dur<strong>in</strong>g the<br />

5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!