23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>in</strong>sert <strong>in</strong>to rfid_db (<strong>Tag</strong>, Value, Date) VALUES<br />

('E0040000E90A4301', '1000','17:19:51 02/07/2010');<br />

<strong>in</strong>sert <strong>in</strong>to rfid_log (<strong>Tag</strong>, Date) VALUES ('E0040000E90A4301',<br />

'17:19:51 02/07/2010');<br />

Subsequently, the real tag (ID: E004000074251502) with value of $1500 will also be<br />

<strong>in</strong>serted to the backend database on the Microsoft SQL 2005 Server. Afterwards, the<br />

<strong>in</strong>tegrity check of the database files on the backend server will be performed, <strong>in</strong> order<br />

to set up the basel<strong>in</strong>e, with Tripwire Manager (TM) before <strong>in</strong>itiat<strong>in</strong>g the attack case<br />

scenario as TM can give the hash values <strong>in</strong> different types such as MD5, SHA, and so<br />

forth. However, only MD5 hash values are the <strong>in</strong>terest of this research. Once, the<br />

<strong>in</strong>tegrity check report is captured and the database of TM will be updated. Hence, as<br />

mentioned <strong>in</strong> the Section 3.2.8, the data map, the prototype of the commercial retail<br />

stock management system setup will be completed <strong>in</strong> a trusted/known operation (see<br />

Appendix 7 for the steps taken before the <strong>in</strong>itial attack case scenario).<br />

3.3.2 Data Generation or Attack Case Scenario<br />

In order to deal with the problems relat<strong>in</strong>g to tag data leakage, traceability, tag<br />

spoof<strong>in</strong>g, clon<strong>in</strong>g and the like <strong>in</strong> <strong>RFID</strong> technology of the retail BS environment (see<br />

Sections 2.4 and 2.5 ), it is important to implement the tag-reader mutual<br />

authentication and data encryption techniques (Kamoun, 2009; Li et al., 2009; Li &<br />

Deng, 2007). Consequently, many researchers and organizations have previously<br />

proposed variety of different mutual authentication protocols such as “lightweight<br />

symmetric-key authentication protocol” proposed by Juels and Weis (2005),<br />

“EMAP” (An Efficient Mutual Authentication Protocol) proposed by Peris-Lopez et<br />

al., (2006), “One-Way-Reader-To-<strong>Tag</strong>” scheme proposed by EPCglobal (2010, p. 1),<br />

“<strong>Tag</strong>-Reader-Mutual-Authentication-Scheme” proposed by Konidala et al., (2007),<br />

just to name a few.<br />

However, as a result of the generally low cost with limited resources; the<br />

encryption methods used <strong>in</strong> security solution for usual comput<strong>in</strong>g environments<br />

cannot be performed by the <strong>RFID</strong> tags (Li & Deng, 2007). Hence, the mutual<br />

authentication protocol can be violated by the malicious attackers. For <strong>in</strong>stance, Li<br />

71

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!