Standardisation of the silent tag and the Privacy Ensuring Affordable

Download Report

Transcript Standardisation of the silent tag and the Privacy Ensuring Affordable

Privacy Ensuring Affordable RFID
System (PEARS) – Feasibility study
By Humberto Morán
Friendly Technologies Ltd
hmoran AT friendlytechnologies.eu
Conventional RFID Tag
Who is
around?
5342324
Issues with conventional RFID tags

Privacy and security



Cost




Industrial
Consumers
Complexity
Dependency on silicon
Reliability when tag density is high
Easy to clone
Limitations of proposed solutions



The most usual – disabling, removal or “killing” of the tag
 Prevents many pre- and post-POS applications
 Requires additional action by consumers
 Vulnerable groups (e.g. children, the elderly or technology-unaware
people) might fail to protect themselves
 Distrusted by consumers
Use of cryptography
 Tags are either too expensive, too slow or both
 Public keys can always leak and threat an entire population of tags
Watchdog devices or blocker tags
 Complex and unreliable
 Interfere with RFID networks
Introducing the Verification Tag –
only replies to its identity
Is 5342324
around?
YES
Verification Tag – remains silent
to generic interrogations
Who is
around?
(Silence)
Who invented Verification Tags?

Invented by Cardullo and Parks in 1973 and described in
their original patent for the passive tag (US-A-3713148):
“Such an answerback signal can take the form of an
identification signal indicative of a particular transponder
means or, alternatively, the answerback signal could be such
that it would only be generated in response to a
predetermined interrogation code wherein the device would
operate as a verification system”
Advantages of Verification Tags

Cannot be read without authorisation



Increased reliability (no collision)
Reduced cost






Privacy and security by design
Simpler tags
Suitability for printing
Can be built into products
Impossible to clone by non-trusted partners
Ideal for product authentication and integrity
Disadvantage: require an intelligent network able to
distribute identities as objects move around.
Advantages of Verification Tags –
authentication and integrity
Advantages of Verification Tags
– secure stock control
Advantages of Verification Tags –
Use in domestic applications
Only challenge of Verification Tags
– distribution of identities
Introducing the Predictive RFID
Network


Special software and network of readers
Polling Readers


interrogate in quick sequence the IDs of objects likely within
their interrogation field
able to follow objects as they move around

Identities are sent around by an intelligent SW

Privacy and security are embedded in the network

More than RFID we are talking abour The Internet of
Things
Supporting Verification Tags – the Predictive
RFID Technique in a Supermarket
Exit
Entrance
Other input for the Predictive
RFID technique







Business Workflow
Heuristics and “learning” algorithms
Reader workload
Security considerations
Timeouts to broaden polling area
Dynamic input for mobile readers
Anti-interference and anti-eavesdropping mechanisms
PEARS – Project objectives


To explore Commercial and Technical feasibility of a highvolume RFID system based on the Verification Tag and
Predictive RFID
Commercial feasibility:




Alternatives to print tags – cost reduction
Capacity planning
Business cases
Technical feasibility:




Manufacturing options
Reader and tag speed
Development of protocols
Simulation SW
Project details






18-months (until June 2009)
Approx budget of £250k (Scottish Government, project
partners)
Partnership is flexible and voluntary
No co-funding for associated members
Every partner keeps own background and foreground IP
The long-term objective is to pave the way for a bigger
research, development and standardisation project
PEARS Partners (commited
and/or interested)
Verification Tags and Predictive RFID: enabling
the socially-acceptable Internet of Things