Abstract
Radio Frequency Identification (RFID) devices have been recently introduced in several applications and services such as National Identification Cards, Passports, Credit Cards, etc. In this paper, we investigate the security of such devices by showing the possibility of conducting RFID eavesdropping using simple and common devices such as a Software Defined Radio platform. Generally classical RF attacks can be made on long range transmission protocols, however we extend the standard RF attacks to cover RFID communication protocols. In this manuscript, an off-line step-by-step analysis is developed to prove the feasibility of reversing a complete RFID protocol. A real-time implementation is also realized to highlight a real threat in the everyday life.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For further details on the used toys, see http://www.journaldulapin.com/tag/karotz.
- 2.
RFID and NFC standards are summarized in [5].
References
ISO/IEC 14443-2: Identification cards Contactless integrated circuit(s) cards Proximity cards Part 2: Radio frequency power and signal interface (2001)
Oren, Y., Schirman, D., Wool, A.: RFID jamming and attacks on Israeli e-voting. In: Smart Objects, Systems and Technologies, pp. 1–7. VDE, Munich (2012)
Thevenon, P.H.: Sécurisation de la couche physique des communications sans contact de type RFID et NFC. Phd thesis, Université de Grenoble (2011)
Di J., Thompson D.R.: Security for RFID tags. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust. Springer, New York (2012)
Khoo, B., Harris, P., Husain, S.A.: Security risk analysis of RFID technology: a RFID tag life cycle approach. In: Wireless Telecommunications Symposium, pp. 1–7, Prague (2009)
Lee, E.: NFC hacking: the easy way. In: 20th DEFCON, Las Vegas (2012). http://www.defcon.org/html/links/dc-archives/dc-20-archive.html
Almeida, M.: Hacking Mifare Classic Cards. In: blackhat, Sao Paulo (2014). http://www.blackhat.com/sp-14/summit.html
Hancke, G.: Eavesdropping attacks on high-frequency RFID tokens. In: 4th Workshop on RFID Security (RFIDSec), pp. 100–113 (2008)
Oren, Y., Shamir, A.: Remote password extraction from RFID tags. IEEE Trans. Comput. 56(9), 1292–1296 (2007)
Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in e-passports. In: Conference on Security and Privacy for Emerging Areas in communications and Networks, pp. 74–88, Athens (2005)
Winkler, M., Faseth, T., Arthaber, H., Magerl, G.: An UHF RFID tag emulator for precise emulation of the physical layer. In: EuWIT, pp. 273–276, Paris (2010)
http://www.nxp.com/products/identification-and-security/nfc-and-reader-ics
Humphreys, T.E., Ledvina, B., Psiaki, M., OHanlon, B., Kintner J. Paul M.: Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: ION GNSS 200, pp 2314-2325, Savannah (2008)
Huang, L., Yang, Q.: GPS SPOOFING Low-cost GPS simulator. In: 23th DEFCON, Las Vegas (2015)
Balduzzi, M.: AIS exposed understanding vulnerabilities and attacks 2.0. In: Blackhat Asia, Singapore, (2014). http://www.blackhat.com/asia-14/archives.html
Feigin, J.: signal processing-practical costas loop design-designing a simple and inexpensive BPSK costas loop carrier recovery circuit. In: RF 25(1), (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Le Roy, F., Quiniou, T., Mansour, A., Lababidi, R., Le Jeune, D. (2018). RFID Eavesdropping Using SDR Platforms. In: De Gloria, A. (eds) Applications in Electronics Pervading Industry, Environment and Society. ApplePies 2016. Lecture Notes in Electrical Engineering, vol 429. Springer, Cham. https://doi.org/10.1007/978-3-319-55071-8_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-55071-8_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55070-1
Online ISBN: 978-3-319-55071-8
eBook Packages: EngineeringEngineering (R0)