Escolar Documentos
Profissional Documentos
Cultura Documentos
"#"$%&
$&
!"#"$%&
•! Common frequencies: low (~125 KHz), high (~13.56 MHz), ultra-high (433
& ~900 MHz), & microwave (2.45 & 5.8 GHz).
5&
!"#"$%&
Security
•! Meant to counter nefarious adversaries (insiders and outsiders)
•! Watch out for mission creep: inventory systems that come to be viewed
as security systems!
6&
!"#"$%&
MC&A
7&
!"#"$%&
MC&A Blunders
8&
!"#"$%&
#&
!"#"$%&
RFID Skimmers, Sniffers, Spoofers, and Cloners; oh my! Documents, code, plans needed to build your own: Free online.
RFID:
!&
!"#"$%&
Data Encryption/Authentication
a&
!"#"$%&
•! But the main problem isn’t RF, it is the fixed static identification number!
&&&&X1F/22@&YXU&
*+&?@<01;GV&A@T;<@?&
b&
!"#"$%&
•! Relying on luck for an inventory system to detect missing material isn’t the
best security strategy for ensuring nuclear materials haven’t been stolen,
diverted, or tampered with.
Z@A2@?A3V)&&.04V&$7)&8&d])&D@??;/2&e&
$%&
!"#"$%&
Questions?
$$&
!"#"$%&
!! *+,-?&31@&3&L;1@4@??&;2T@2G/1V&A@T;<@&NGM;2E&S@4@<G1/2;<&O31&</A@(P&
!! D34@?&1@T@20@?&/I&f6%%&_&f8%6&];44;/2&;2&5%%7Q&
!! ]32V&?V?G@:?&31@&F/T@12@A&OV&K0O4;<&?G32A31A?&N,DgPQ&
!! D/:@&*+,-&3KK4;<3=/2?B&
*+,-&G3F?&31@&hgU&D@<01;GV&U3F?Q&&UM@V&31@B&
i!&&j3?V&G/&4;kQ&
i!&&j3?V&G/&</02G@1I@;GQ&&X44&?/kL31@)&K31G?)&`&;2I/1:3=/2&31@&1@3A;4V&3T3;43O4@Q&
i!&&j3?V&G/&G3:K@1&L;GM&GM@&1@3A@1Q&&h/&3<<@??&G/&GM@&G3F&;G?@4I&;?&2@@A@AQ&
DG31=2F&L;GM&l@1/&E2/L4@AF@)&;G&G//E&5&L@@E?)&32A&&
m&f5%&;2&K31G?&G/&A@:/2?G13G@&8&A;H@1@2G&?0<<@??I04&A@I@3G?&
!! The high-tech features often fail to address the critical vulnerability issues.
!! Developers & users have the wrong expertise and focus on the wrong issues.
$5&
!"#"$%&
4. Payoff Security Maxim: The more money that can be made from
defeating a technology, the more attacks & attackers will appear.
There are two kinds of fools: One says, “This is old, therefore it is good.”
The other one says, “This is new, therefore it is better.”
-- William R. Inge (1860-1954)
6. RFIDs and rf technology has been around for decades & are
now widely used in many applications, including by home hobbyists
for robotics and home automation.
$6&
!"#"$%&
12. The Internet & patents are full of RFID design & attack information.
$7&
!"#"$%&
9/02G@1I@;=2F&?@<01;GV&A@T;<@?&;?&0?0344V&@3?;@1&
GM32&A@T@4/K@1?)&T@2A/1?)&`&:320I3<G01@1?&<43;:Q&
gk@2&/T@14//E@AB&&UM@&O3A&F0V?&0?0344V&/24V&
2@@A@A&G/&:;:;<&GM@&?0K@1^<;34&3KK@3132<@&32A&
-#./0&GM@&3KK31@2G&K@1I/1:32<@&/I&GM@&?@<01;GV&
A@T;<@)&2/G&GM@&A@T;<@&;G?@4IQ&
Some thoughts:
!! U13<E;2F&32A&4/<3=2F&</2G3;2@1?&/I&20<4@31&:3G@1;34?&L/04A&/?G@2?;O4V&K1/T;A@&
0?@I04&;2I/1:3=/2&/2&GM@k&32A&A;T@1?;/2Q&
!! >0G)&G13<E;2F&3&</2G3;2@1&;?&2/G&GM@&?3:@&3?&G13<E;2F&;Gn?&</2G@2G?Q&
]/1@/T@1)&;I&GM@1@&31@&2/&</02G@1:@3?01@?&G/&?K//^2F)&V/0&<32nG&G10?G&GM@&A3G3&3O/0G&
GM@k&32A&A;T@1?;/2Q&
!! ,G&;?&2/G&@3?V&G/&A@G@<G&?K//^2FQ&&D@<01;GV&:0?GQ&&
$8&