Skip to main content

RFID Eavesdropping Using SDR Platforms

  • Conference paper
  • First Online:
Applications in Electronics Pervading Industry, Environment and Society (ApplePies 2016)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 429))

Abstract

Radio Frequency Identification (RFID) devices have been recently introduced in several applications and services such as National Identification Cards, Passports, Credit Cards, etc. In this paper, we investigate the security of such devices by showing the possibility of conducting RFID eavesdropping using simple and common devices such as a Software Defined Radio platform. Generally classical RF attacks can be made on long range transmission protocols, however we extend the standard RF attacks to cover RFID communication protocols. In this manuscript, an off-line step-by-step analysis is developed to prove the feasibility of reversing a complete RFID protocol. A real-time implementation is also realized to highlight a real threat in the everyday life.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For further details on the used toys, see http://www.journaldulapin.com/tag/karotz.

  2. 2.

    RFID and NFC standards are summarized in [5].

References

  1. ISO/IEC 14443-2: Identification cards Contactless integrated circuit(s) cards Proximity cards Part 2: Radio frequency power and signal interface (2001)

    Google Scholar 

  2. Oren, Y., Schirman, D., Wool, A.: RFID jamming and attacks on Israeli e-voting. In: Smart Objects, Systems and Technologies, pp. 1–7. VDE, Munich (2012)

    Google Scholar 

  3. Thevenon, P.H.: Sécurisation de la couche physique des communications sans contact de type RFID et NFC. Phd thesis, Université de Grenoble (2011)

    Google Scholar 

  4. Di J., Thompson D.R.: Security for RFID tags. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust. Springer, New York (2012)

    Google Scholar 

  5. Khoo, B., Harris, P., Husain, S.A.: Security risk analysis of RFID technology: a RFID tag life cycle approach. In: Wireless Telecommunications Symposium, pp. 1–7, Prague (2009)

    Google Scholar 

  6. Lee, E.: NFC hacking: the easy way. In: 20th DEFCON, Las Vegas (2012). http://www.defcon.org/html/links/dc-archives/dc-20-archive.html

  7. Almeida, M.: Hacking Mifare Classic Cards. In: blackhat, Sao Paulo (2014). http://www.blackhat.com/sp-14/summit.html

  8. Hancke, G.: Eavesdropping attacks on high-frequency RFID tokens. In: 4th Workshop on RFID Security (RFIDSec), pp. 100–113 (2008)

    Google Scholar 

  9. Oren, Y., Shamir, A.: Remote password extraction from RFID tags. IEEE Trans. Comput. 56(9), 1292–1296 (2007)

    Article  MathSciNet  Google Scholar 

  10. Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in e-passports. In: Conference on Security and Privacy for Emerging Areas in communications and Networks, pp. 74–88, Athens (2005)

    Google Scholar 

  11. Winkler, M., Faseth, T., Arthaber, H., Magerl, G.: An UHF RFID tag emulator for precise emulation of the physical layer. In: EuWIT, pp. 273–276, Paris (2010)

    Google Scholar 

  12. http://www.nxp.com/products/identification-and-security/nfc-and-reader-ics

  13. http://www.gnuradio.org/redmine/projects/gnuradio/wiki

  14. http://www.sourceforge.net/p/openlte/wiki/Home/

  15. Humphreys, T.E., Ledvina, B., Psiaki, M., OHanlon, B., Kintner J. Paul M.: Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: ION GNSS 200, pp 2314-2325, Savannah (2008)

    Google Scholar 

  16. Huang, L., Yang, Q.: GPS SPOOFING Low-cost GPS simulator. In: 23th DEFCON, Las Vegas (2015)

    Google Scholar 

  17. Balduzzi, M.: AIS exposed understanding vulnerabilities and attacks 2.0. In: Blackhat Asia, Singapore, (2014). http://www.blackhat.com/asia-14/archives.html

  18. http://www.rtl-sdr.com/adsb-aircraft-radar-with-rtl-sdr

  19. Feigin, J.: signal processing-practical costas loop design-designing a simple and inexpensive BPSK costas loop carrier recovery circuit. In: RF 25(1), (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to F. Le Roy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Le Roy, F., Quiniou, T., Mansour, A., Lababidi, R., Le Jeune, D. (2018). RFID Eavesdropping Using SDR Platforms. In: De Gloria, A. (eds) Applications in Electronics Pervading Industry, Environment and Society. ApplePies 2016. Lecture Notes in Electrical Engineering, vol 429. Springer, Cham. https://doi.org/10.1007/978-3-319-55071-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-55071-8_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-55070-1

  • Online ISBN: 978-3-319-55071-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics