23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.2.2 Review of Problem Areas <strong>in</strong> <strong>RFID</strong> Stock Management System<br />

As mentioned <strong>in</strong> the previous chapter (Chapter 2; Section 2.4), there are so many<br />

threats and challenges <strong>in</strong> <strong>RFID</strong> enabled BS. Different researchers <strong>in</strong> recent literature<br />

proposed different <strong>RFID</strong> security risk models (Garf<strong>in</strong>kel et al., 2005; Karygiannis et<br />

al., 2006; D<strong>in</strong>g et al., 2008; Mitrokotsa et al., 2010) while other researchers discussed<br />

the classifications of <strong>RFID</strong> attacker behaviors (for example: Mirowski, Hartnett &<br />

Williams, 2009). Nonetheless, the problems concerned with the proposed security<br />

risk model related to this research (see Section 2.5, Figure 2.15) will be reviewed and<br />

discussed as follows:<br />

3.2.2.1 The SI Entity Security Risk<br />

The architecture and eng<strong>in</strong>eer<strong>in</strong>g of a <strong>RFID</strong> <strong>Tag</strong> (Section 2.1.1) <strong>in</strong>vites a suite<br />

of obvious attacks that may exploit any radio frequency device, for example,<br />

as stated <strong>in</strong> Sections 2.4 and 2.5, radio frequency jamm<strong>in</strong>g, sniff<strong>in</strong>g, teas<strong>in</strong>g<br />

(for replay), track<strong>in</strong>g, and <strong>in</strong>terference (disrupt and denial) (Bolan, 2007; Rao,<br />

et al., 2005). Some of the less obvious vulnerabilities are <strong>in</strong> the perceived<br />

appetite for risk. The false sense of security engendered by the <strong>in</strong>novation and<br />

the „off-l<strong>in</strong>e‟ context reduce awareness of the potential threats and yet the high<br />

value of the stock <strong>in</strong>ventories managed by <strong>RFID</strong> tags heightens the crim<strong>in</strong>al‟s<br />

motivation to take a risk. The perception that <strong>RFID</strong> tags (Section 2.1.1) are<br />

small and cannot be protected overlooks the grow<strong>in</strong>g capacity of <strong>Tag</strong>s and the<br />

strengthen<strong>in</strong>g of encryption algorithms. The scanners (Section 2.1.2) and the<br />

relatively large number of l<strong>in</strong>es of source code use to read and write on tags<br />

provide a celebrity challenge and backdoor for crim<strong>in</strong>al activity.<br />

Accord<strong>in</strong>g to the literature review <strong>in</strong> Section 2.1.1, <strong>RFID</strong> tags are<br />

passive and active by nature of their design and each type has particular risks.<br />

The type of tag can determ<strong>in</strong>e the attack vector and the proximity an attacker<br />

must ga<strong>in</strong> (Mirowski et al., 2009). For example a tag with a range of one meter<br />

or less would require the presence of an attacker onsite and possible social<br />

eng<strong>in</strong>eer<strong>in</strong>g for a radio attack to be effective. Passive tags are open to kill hits<br />

and hence the retail exit security can be negated (Tu & Piramuthu, 2008; El-<br />

Said & Woodr<strong>in</strong>g, 2009). Active tags with the read/write feature can be<br />

60

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!