23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.3 DATA REQUIREMENTS<br />

The data requirements for the research project <strong>in</strong>clude several different sources,<br />

accord<strong>in</strong>g the Bus<strong>in</strong>ess System (BS) architecture of a <strong>RFID</strong> stock management<br />

system (see Table 2.4). The BS consists of three entities namely the Stock Item (SI),<br />

the po<strong>in</strong>t of sale (POS), and the Bus<strong>in</strong>ess Information System.<br />

Figure 3.10: The Bus<strong>in</strong>ess System Entity Composition (author)<br />

As mentioned <strong>in</strong> the previous Chapter 2 (Section 2.3), each entity has sub-systems<br />

and services that are required by the other entities. For <strong>in</strong>stance, the SI requires <strong>RFID</strong><br />

<strong>Tag</strong>s, a scanner, and services from POS and BIS. The POS requires a Transaction<br />

Process<strong>in</strong>g System (TPS), scanners (for cards, <strong>Tag</strong>s and Chips), a <strong>Tag</strong> attach/detach<br />

service and the services of SI and BIS.<br />

Hence, to <strong>in</strong>vestigate the presence of digital evidence after the theft of a SI; a<br />

prototype of commercial retail environment us<strong>in</strong>g a <strong>RFID</strong> stock management system<br />

will firstly be constructed <strong>in</strong> the laboratory. Secondly, the SQL poison<strong>in</strong>g attack will<br />

be launched through <strong>RFID</strong> tag. Then, each entity <strong>in</strong> the BS will be <strong>in</strong>vestigated for<br />

evidence of the theft. The extraction of the evidence will take place from the tag, the<br />

scanner, the POS, and the SQL server. In addition, the closed-circuit television<br />

(CCTV) and <strong>in</strong>terview evidence are considered relevant to the <strong>in</strong>vestigation.<br />

3.3.1 System Design<br />

BS = SI + POS + BIS<br />

In order to conduct the experimental research, a simple <strong>RFID</strong> stock management<br />

system (see Figures 3.10 and 3.11) will be set up by us<strong>in</strong>g a s<strong>in</strong>gle test-station<br />

runn<strong>in</strong>g W<strong>in</strong>dows XP Service Pack 2 (W<strong>in</strong>XP SP2) as a POS term<strong>in</strong>al. The <strong>RFID</strong><br />

reader driver (Tracient TraceConnect Software Developer Kit) and enterprise version<br />

of Microsoft SQL Server 2005 for backend database, <strong>in</strong> order to store<br />

data/<strong>in</strong>formation relevant to SI, will be <strong>in</strong>stalled on the test-station. Then, a s<strong>in</strong>gle<br />

UHF <strong>RFID</strong> scanner/reader (Tracient <strong>RFID</strong> reader) will be attached to the test-station<br />

via Universal Serial Bus (USB) port. Furthermore, the customized <strong>RFID</strong> middleware<br />

69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!