23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.0 INTRODUCTION<br />

Chapter 2 -<br />

Literature Review<br />

The focus of this research is on the crim<strong>in</strong>al risk of the Read/Write radio<br />

frequency identification (<strong>RFID</strong>) chip <strong>in</strong> the retail environment. These chips are<br />

used to tag stock with an identification (ID) that provides two utility values for<br />

the retailer; namely theft protection (ie. The tag is removed at the po<strong>in</strong>t of sale<br />

so the exit sensors do not alarm). Similarly, these chips are mapp<strong>in</strong>g <strong>in</strong>to the<br />

retail database for price and stock control – this <strong>in</strong>cludes the po<strong>in</strong>t of sale<br />

process and <strong>in</strong>ventory control process (Chalasani et al., 2005). <strong>RFID</strong> chips are<br />

divided <strong>in</strong>to passive and active and each type has particular risks. Passive chips<br />

are open to “kill” hits and hence the retail exit security can be negated (Chawla<br />

& Ha, 2007; El-Said & Woodr<strong>in</strong>g, 2009). Active chips with the read/write<br />

feature can be hacked <strong>in</strong> order to change the ID and <strong>in</strong> practice swap an ID<br />

l<strong>in</strong>ked to a higher price with an ID l<strong>in</strong>ked to a lower price (Ha<strong>in</strong>es, 2006a,<br />

2006b; Jeng, Chang, & Wei, 2009).<br />

One of the concerns for retail is that as <strong>RFID</strong> chips are made more user<br />

friendly then the risk of attack grows. Jones et al., (2006a) describes the<br />

evolution of <strong>RFID</strong> chip design and process time costs. In the manufacture of<br />

chips the access to writ<strong>in</strong>g has become easier <strong>in</strong> the <strong>in</strong>terest of lett<strong>in</strong>g retailers<br />

code their own chips. The benefit has however brought with it easier access for<br />

crim<strong>in</strong>als to write and rewrite over chips and hence change the values (<strong>in</strong>clud<strong>in</strong>g<br />

the null value) <strong>in</strong> a <strong>RFID</strong> system. System solutions are provided by Solanas et<br />

al., (2007) and others. <strong>Digital</strong> forensic research <strong>in</strong>to small devices is a current<br />

growth area of knowledge (Harrill & Mislan, 2007). In the <strong>Digital</strong> Forensic<br />

Research Workshop (DFRWS) road map for <strong>Digital</strong> Forensic research, small<br />

devices were aga<strong>in</strong> prioritised as key areas for research and growth of<br />

<strong>in</strong>vestigator knowledge (Palmer, 2001). Xiao et al., (2007) raises a number of<br />

research issues associated with <strong>RFID</strong> <strong>in</strong>vestigations and suggests that<br />

application research has to be evaluated. Rieback et al., (2006a) explicitly<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!