23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

def<strong>in</strong>es different types of malware that are available for <strong>RFID</strong> attack and advises<br />

middleware developers to proceed <strong>in</strong> a considerate fashion. Each of these<br />

references has guidance for research and specific details of small device forensic<br />

techniques.<br />

The literature reviewed shows that research is lead<strong>in</strong>g towards<br />

knowledge of better system architectures and to better best practice guidance<br />

knowledge for digital <strong>in</strong>vestigators. For example, Chalasani et al., (2005)<br />

discusses possible improvements <strong>in</strong> network designs and Chalasani et al., (2007)<br />

<strong>in</strong>vestigates improv<strong>in</strong>g the data architectures of the <strong>RFID</strong> transaction system.<br />

The National Institute of Justice (NIJ) Report (2005) also cont<strong>in</strong>ues the theme<br />

by specify<strong>in</strong>g best forensic <strong>in</strong>vestigator practice for small devices – but does not<br />

report <strong>RFID</strong> chip practice. This appears to be a gap <strong>in</strong> the current professional<br />

literature. Jeong and Kim (2005) provide guidance for <strong>RFID</strong> architectures <strong>in</strong><br />

ubiquitous environments. Much of the knowledge of <strong>RFID</strong> systems comes from<br />

papers report<strong>in</strong>g security problems and architectures for <strong>RFID</strong> systems. The<br />

security analysts have <strong>in</strong>terrogated <strong>RFID</strong> systems to understand the risks and<br />

vulnerabilities of the systems. As a consequence, the technical def<strong>in</strong>ition and<br />

scope are made explicit. For example Li et al., (2008) proposes a cross-layer<br />

architecture to protect the system and user privacy. Others have taken up the<br />

challenge to ask the forensic question of <strong>RFID</strong> systems. For example, Khanna et<br />

al., (2006) spelled out a general method of <strong>in</strong>quiry for physical devices, and Kim<br />

et al., (2007) for <strong>RFID</strong> systems <strong>in</strong> particular. Martone et al., (2006) go a step<br />

further and exam<strong>in</strong>e current forensic identification techniques for data<br />

verification <strong>in</strong> <strong>RFID</strong> systems.<br />

The proposed study will look at the identification of all possible data<br />

storage locations <strong>in</strong> a <strong>RFID</strong> system. Also recommendations for digital forensic<br />

<strong>in</strong>vestigators work<strong>in</strong>g on <strong>RFID</strong> systems for best practice will be made. Thus, the<br />

literature review chapter is firstly organized <strong>in</strong>to a three-tier model of the <strong>RFID</strong><br />

system <strong>in</strong> the retail sector <strong>in</strong>clud<strong>in</strong>g a material level (Section 2.1). Different types<br />

of tags, readers, the hosts and <strong>in</strong>formation system (Section 2.2) are reviewed. For<br />

example, where the data on tag is stored, the way <strong>in</strong> which the data is captured by<br />

the reader and transferred to the backend database servers or enterprise<br />

applications and bus<strong>in</strong>ess processes of a <strong>RFID</strong> system (Section 2.3). Then, the<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!