Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Security Your Rights Online

RFID Fingerprints To Fight Tag Cloning 59

Bourdain writes with news out of the University of Arkansas, where researchers are looking for ways to combat counterfeit RFID tags. Passive tags typically wait for a reader to transmit a signal of the appropriate strength and frequency before sending their own transmission. The scientists found that the amount of power required to trigger this varies quite a bit from one tag to the next, especially when many different frequencies are sampled. This and other physical characteristics give the tag its own "fingerprint" that is independent of the signal information stored in its memory, which the researchers say will facilitate the detection of cloned tags.
This discussion has been archived. No new comments can be posted.

RFID Fingerprints To Fight Tag Cloning

Comments Filter:
  • by Anonymous Coward on Saturday November 21, 2009 @01:05AM (#30182088)
    If you can read the fingerprint, so can anyone...

    So what's to stop a dedicated attacker from reading the fingerprint when they read the tag contents, and then devising a method to duplicate all the data?

    An active tag might even be programmed to emulate the fingerprint characteristics.
    • by Mikkeles ( 698461 ) on Saturday November 21, 2009 @01:10AM (#30182116)

      Simple; they'll keep the algorithm a secret! ;^)

    • Re: (Score:1, Informative)

      by sdiz ( 224607 )

      Those fingetprints are physical charactistics due to manufacturing process. You can't duplicate them in software.

      • Re: (Score:1, Interesting)

        by Anonymous Coward
        Then duplicate them in hardware?
    • by cortesoft ( 1150075 ) on Saturday November 21, 2009 @02:03AM (#30182290)

      I don't know if it will be that easy. These fingerprints seem to be based on the fact that all RFID chips have flaws, and they are all flawed in different ways.... including the device that is trying to act as the clone of the RFID. What this means is that this clone RFID has to be able to mimic EXACTLY the flaws of the real thing without giving itself away by its OWN flaws. Without knowing more details about the flaws they are trying to measure, it is hard to say whether that would be possible. If the flaws are easily mimicked in the sense that you can create a clone whose own defects are not detected because they are all superseded by the original's flaws, it may work. If they vary so much that every clone will have some flaw that is severe enough to shine through, it would be impossible.

      • It would ideally force fake goods vendors to buy or steal the genuine RFID tags to forge, that's all. Given that the RFID tags themselves, like bar tags, must remain far less costly than the actual goods, this means very little to the economics of forging the tags unless the vendors can be bothered to very closely monitor sales of the genuine tags. Somehow, this seems unlikely for such bulk items which are also manufactured primarily overseas.

      • Re: (Score:3, Insightful)

        by vojtech ( 565680 )

        It just means the clone will have to be a bit more expensive.

        Cloned tags aren't using the same cheap chips that the common passive tags do. An attacker can afford to carry batteries with him and make the tag completely locally powered. Then he has much more powerful electronics at his disposal and can simulate whatever frequency response the original tag had due to its cheap (few cents per tag) design.

        This fingerprinting will do no more than to force the attacker to pay a few bucks more to create a clone.

    • So what's to stop a dedicated attacker from reading the fingerprint when they read the tag contents, and then devising a method to duplicate all the data?

      An active tag might even be programmed to emulate the fingerprint characteristics.

      I RTFA and I feel like I'm missing something.
      They have a fingerprint of the RFID... and?
      Are they proposing to embed the fingerprint in the RFID's data as a CRC/encrypted check?
      Are you going to create a database of fingerprints and query it when the tag gets scanned?

      I can't be the only one wondering what's the practical application of the discovery.

      • > Are you going to create a database of fingerprints and query it when the tag gets scanned?

        I guess this is the case. So when the RFID chip is initially embedded in whatever (box/device/etc...), it gets this 'special' scan, and the data would need to be stored/transmitted separately/securely to the receiver (basically, wherever they want to perform a 'copy' check) at various points of the items travels.

        This would help enable the ability to detect both replacement of the product (so you can tell if your

    • If you can read the fingerprint, so can anyone... So what's to stop a dedicated attacker from reading the fingerprint when they read the tag contents, and then devising a method to duplicate all the data? An active tag might even be programmed to emulate the fingerprint characteristics.

      If you can read the fingerprint, so can anyone

      -true, that's not the point, no one can WRITE the fingerprint (or at least it would be prohibitively difficult to do so currently)

      An application of this could include:
      -Secure building entry; the building could maintain a database of both the RFID fingerprint and the RFID data and only grant admission to those with that combination (the RFID data would, in theory, also contain information about its fingerprint as well)

      -RFID isn't meant to be an encryption system, it's meant to be more like a more effic

  • Potentiometer (Score:3, Interesting)

    by White Flame ( 1074973 ) on Saturday November 21, 2009 @01:15AM (#30182134)

    So if I have a pot wired across the power receiver, I can twiddle it until it matches. If people know the factors being sampled, they can adjust them.

  • by Joe The Dragon ( 967727 ) on Saturday November 21, 2009 @01:19AM (#30182158)

    Does this say the same at 55-70+ mph or just at much lower walking speeds?

    • Please excuse my ignorance, by why would a difference of 50 mph matter to an rfid signal?

      • I'll take Doppler-shift [wikipedia.org] for $50, Alex.

        Don't take me too seriously. I'm just guessing that was what he was referring to.

        • HAHAHA, I'm hoping not. The Doppler shift is a function of proportional velocity, that is, it isn't until you are moving at a fraction of the speed of LIGHT are EM waves effected. A conservative estimate puts that at about c/1.003/1000 = 186 miles per second.

          So when you have a car that goes that fast [at or away from your receiver/transmitter], your EM frequencies might get noticeably shifted, but on this planet, you'ld also probably be on fire.

          • Re: (Score:1, Redundant)

            by GMC-jimmy ( 243376 )

            Perhaps a Redshift [wikipedia.org] then? C'mon, have some fun. :)

            • I'm not sure why you were modded redundant this deep, fuck that guy.

              But the only reason I know about redshift/blueshift speeds is that (years ago) after reading "a brief history of time" I wanted to calculate how fast a car would have to be moving for the red light to actually be green...and then I was dismayed when I found that no man-made vehicle had ever gone that fast or was even an order of magnitude close to going that fast.

          • What about Doppler Radar used in weather? A quick Wiki read indicates it is detecting a frequency shift to determine velocities. Rain certainly is not moving at a fraction of the speed of light.
            • It is my fault for not explaining properly. I'll try again. Either, the target is moving so fast that the frequencies are shifted out of band (not likely), or any shift can be compensated for because range-rate of the device can estimated.

              Even so, Realistically none of this matters. Because detector for things like this can be placed orthogonal to the direction of motion so that the doppler effect is non-existent.

  • What's the point? (Score:3, Interesting)

    by AdamInParadise ( 257888 ) on Saturday November 21, 2009 @01:36AM (#30182210) Homepage

    Just use a sensible crypographic authentication mechanism and be done with it. I guess that it is interesting from a "pure science" point of view but I'm not quite sure that this should be used to detect fake passports.

    • Re: (Score:1, Interesting)

      by Anonymous Coward
      They are dealing with passive RFID chips, so they probably want to keep the chips cheap and put the smarts in the reader. I agree that simply using more expensive RFID chips would make far more sense if security is an issue.
    • Re: (Score:2, Interesting)

      by sdiz ( 224607 )

      These are passive tags, i.e. ultra-low power consumption. You can't put any decent crypto on it.

    • by cortesoft ( 1150075 ) on Saturday November 21, 2009 @02:07AM (#30182320)

      Crypto wouldn't work... the cloner doesn't have to break the encryption to copy the chip.

      Imagine in this way.... you have an encrypted hard drive, and someone wants to pass off their hard drive as yours. They don't have to break the encryption... they can copy the drive byte for byte, and hand it to the person who if verifying that is the original. The person checking the data is the one who does the decrypting.

      • Re: (Score:1, Offtopic)

        If your hard drive only sends data when it has authenticated the motherboard how do you plan on reading the hard drive to copy it in the first place?

      • Re:What's the point? (Score:4, Informative)

        by owlstead ( 636356 ) on Saturday November 21, 2009 @05:28AM (#30182962)

        Depends on the chip. If you include ISO 14443 processor cards then you can have crypto, combined with secure on chip storage of the key of course. You are giving away this chip, so you must make sure that the chip storage and on board crypto is sufficiently protected against attacks. E.g for passports you can have active authentication or chip authentication to verify that the chip is not cloned.

        • Re: (Score:3, Informative)

          by owlstead ( 636356 )

          Replying on myself here, but the original article does not seem to include processor chip technology.

          That and it should have read ISO 14443 processor chips of course, not ISO 14443 processor cards. It's Saturday morning over here - need cafeine.

      • by AdamInParadise ( 257888 ) on Saturday November 21, 2009 @05:51AM (#30183040) Homepage

        Encrypting a hard drive protects the confidentiality of its data. It does not prevent you from cloning the hard drive i.e. it does not protect the authenticity of the hard drive.

        In many applications that use RFID tags, authenticity is much more important than confidentiality. Those researchers seem to propose a way to authenticate the RFID tag using its "fingerprint". What I'm saying is that a dynamic challenge-response scheme is much more practical and more reliable.

        Crypto is not only about encrypting data.

      • by MobyDisk ( 75490 )

        I think RFID crypto involves things like challenge-response. They can still do that on passive tags.

        Also, what do the US passport RFID tags use that prevents copying?

    • Re: (Score:2, Interesting)

      by oljanx ( 1318801 )
      It's not practical for a passive RFID tag to provide cryptographically secure authentication. Only a very small amount of power can be transmitted from the reader to the tag, just enough to transmit back a fairly simple ID. If you want a secure challenge/response mechanism it would require much more power, an active tag would be required.
      • If you want a secure challenge/response mechanism it would require much more power, an active tag would be required.

        An active RFID tag (i.e. a battery powered tag) is not required. Just look at DESFire cards: probably not as cheap as passive RFID tags but they can handle a simple challenge/response mechanism. If you want something more beefy, look at the DDA mechanism specified by EMV and used by Visa and Mastercard: it uses RSA with 3 levels of public keys. It works just fine on simple microprocessor-based

  • by Anonymous Coward

    So... we're now looking into methods of physical authentication for digital authentication data that was intended to replace physical authentication?

    Wouldn't it be easier (and cheaper) to go back a step?

  • by oljanx ( 1318801 ) on Saturday November 21, 2009 @02:41AM (#30182454)
    Because it's not practical to produce a reader capable of transmitting enormous amounts of power, the complexity of passive tags is inherently limited. They are essentially glorified bar codes. This type of "fingerprinting" might add another level of complexity to the identification of tags, but it's not going to prevent counterfeit tags. At best it will slow down the production of counterfeit tags by an insignificant amount of time.
  • by lhunath ( 1280798 ) <lhunathNO@SPAMlyndir.com> on Saturday November 21, 2009 @04:04AM (#30182724) Homepage

    RFID tags are not security devices, they are hyped barcodes. They do not provide any authentication.

    If you're worrying about your RFID tags being cloned for a malicious purpose, you are using them for the wrong thing.

    • Can anyone give me an example of a situation where someone would want to clone RFID tags ?
      Who would be using them for authentication ?

    • It smells to me like they are getting ready to chip us all. Can't have you masquerading as Obama. It'll probably be MANDATORY in Obamacare.

      -Oz

  • Ok, at first, this made no sense to me. The trouble I had was understanding how the flaws(uncontrolled manufacturing artifacts) would be of any use. I think I finally figured out what that poorly written article was trying to get across.

    Say, for example,you have 200 million different passports. They should have 200 million different PROGRAMMED sets of information. At the time the passport is issued, the RFID is scanned to detect the FLAWS in it. This is recorded and filed away somewhere. The FLAWS are recor

  • This is nothing new (Score:5, Informative)

    by ian_mackereth ( 889101 ) * on Saturday November 21, 2009 @05:34AM (#30182988) Journal
    This sort of physical characteristic fingerprinting has been done for years on magnetic stripe cards and EEPROM smartcards, so this is nothing new in theory, just in what physical characteristics are being measured.

    In mag stripes, the magnetic remanence of the strip is different from card to card, in EEPROM, differences in the voltage levels and speed of reading of the cells are used.

    The general principle is that it's no point having unbreakable crypto if the data can simply be copied to a new medium. Consider a card (of whatever type) that stores monetary value for public transport or photocopying or whatever: Put $100 on it and copy the data, not knowing which bits are what. Copy that data onto a heap of cards bought with $5 of credit on them and sell them in the grey market for $50 each and pocket the profit.

    With this sort of technique, though, part of that encrypted data is a fingerprint based on the physical characteristics of the original card. The new cards will generate a fingerprint in the reader that doesn't match the original, making the copies invalid.

    Sure, if you can crack the encryption, this method is useless, but that's not the point. Crypto can be pretty good and costs more than a cheap reader/writer to break to duplicate cards/RFIDs.

  • full clone (Score:2, Interesting)

    by Spaham ( 634471 )

    well, they'll just have to clone that parameter too.
    Unless of course the industrial process used to create the tags makes each one of them a bit different,
    hence defeating the identification in the first place.

    • well, they'll just have to clone that parameter too. Unless of course the industrial process used to create the tags makes each one of them a bit different, hence defeating the identification in the first place.

      Yes, the individual nature of the devices is the whole point of the exercise.

      No, that doesn't defeat the identification, it allows/enhances it. It means that, unless the copier can decrypt the data and encrypt with a new fingerprint, the fingerprint parameter on the copied device won't match the value generated by the reader using the physical characteristics.

  • by jcochran ( 309950 ) on Saturday November 21, 2009 @06:13AM (#30183102)

    given what the article says.

    What they're measuring is the minimum power level that a given RFID will respond to. This opens up two major issues.

    1. A database of the response curves is needed in order to uniquely identify the RFID chip in question.
    2. Since the power received follows the inverse square law, one of the major advantages of an RFID chip is negated. Namely the ability to scan for it's presence without having to have exact location. They need to precisely control the distance from the RFID chip and the reader in order for that technology to work. And if they need that level of control, why not use a contact based technology?

  • I wonder if their data will scale? Is it effected by temperature changes? Humidity changes (especially Gen2 tags)? It's one thing to notice the uniqueness of a few hundred chips, but it a passport database could have billions of entries, or say a database of tagged cash with trillions of entries, would entries still be unique under varying temperature and humidty? Or just mostly unique, like social security numbers? Another way of reducing counterfeiting is to track where the item is supposed to be
    • Actually, the detectable set of flaws doesn't have to be globally unique.
      Say you have a population of 1 million RFIDs that you consider suitable for this higher level of authentication. And assume that you have a set of 1000 detectable "fingerprints" of potential flaws.
      That means that if someone were to attempt to duplicate one of the protected RFIDs, they would only have a 1 in a thousand chance of doing so successfully.

  • Given that the fingerprint is due to "radio-frequency and manufacturing differences" and "significantly different for same-model tags," isn't it also possible that a tag's fingerprint may vary over time?

    And if the idea is "to detect counterfeit tags," how can they do that if tags of the same model have different fingerprints?

  • But the act of embedding the correct fingerprint signature into the RFID tag might change the signature! How's that cat doing, anyway.

E = MC ** 2 +- 3db

Working...