AUTHENTICATION ENHANCEMENT OF RFID CARD USING AN ELECTRONICALLY CLIPPABLE SHIELD AND FINGERPRINT-BIOMETRICS IKUESAN RICHARD ADEYEMI A dissertation submitted in partial fulfillment of the requirements for the award of the degree of Master of Science (Information Security) Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia JANUARY, 2012 iv This dissertation is dedicated to my family for their endless support and encouragement, and particularly, to Philip and Samson Ikuesan. v ACKNOWLEDGEMENT First and foremost, I would like to express my sincere gratitude to my supervisor Dr. Norafida Binti Ithnin for her unfading support, encouragement, and enlightenment through-out the period of this study, without whom, much effort would have been in vain and this project may have not seen fruition. I would also want to appreciate all my colleagues in information security class, especially, those under the supervision of Dr. Norafida. Special appreciation to all members of the Skudai Joy Gospel Chapel, a family that I will never forget. Finally, I would like to appreciate all staffs of FSKSM, UTM and the entire UTM staff at large for the conducive learning environment. vi ABSTRACT Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card, responds to query irrespective of ‘Who’ holds the card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is classified as an unauthorized use of card, and it forms the bedrock for RFID card compromise especially in access control. As an authentication enhancement mechanism, this study designed and developed a method termed BIO-THENTIC Card, that integrates three existing mitigation methods which are physical clip tag, Faraday shield and fingerprint authentication; to prevent and also protect this weakness. The Bio-Thentic Card was fabricated, tested and assessed in line with the known threats, and attacks; and it was observed to proffer substantive solution to unauthorized use of RFID Card. vii ABSTRAK Pengenalpastian frekuensi radio (RFID) adalah teknologi yang menggunakan pengecam asas objek yang tertanam dalam cip, dihantar melalui gelombang radio, untuk pengenalan. Kad RFID, respons kepada pertanyaan tanpa mengira Siapa yang memegang kad seperti kunci pintu. Sejak penyerang boleh memiliki kad tersebut, akses kepada Oleh itu, objek itu boleh dengan mudah berkompromi. Pelanggaran keselamatan ini diklasifikasikan sebagai penggunaan tanpa kebenaran kad, dan ia membentuk batu hampar untuk berkompromi kad RFID terutama dalam kawalan akses. Sebagai mekanisme peningkatan pengesahan, kajian ini direka dan dibangunkan satu kaedah yang dipanggil BIO-Kad THENTIC, yang mengintegrasikan tiga kaedah mitigasi yang sedia ada yang tag klip fizikal, Faraday perisai dan pengesahan cap jari; untuk mencegah dan juga melindungi kelemahan ini. Kad Bio-Thentic direka, diuji dan dinilai selaras dengan ancaman yang diketahui, dan serangan; dan diperhatikan untuk mengajukan penyelesaian substantiative penggunaan tanpa kebenaran Kad RFID. viii TABLE OF CONTENT CHAPTER 1. TITLE PAGE DECLARATION iii DEDICATION iv ACKNOWLEDGEMENT v ABSTRACT vi ABSTRAK vii LIST OF TABLE xiii LIST OF FIGURE xiv LIST OF EQUATION xvii INTRODUCTION 1.1 Introduction 1 1.2 Problem Background 2 1.3 Problem Statement 3 1.4 Project Aim 4 1.5 Objective 4 1.6 Project Scope 4 1.7 Significance of the Project 5 1.8 Organization of Report 5 ix 2 LITERATURE REVIEW 2.1 2.2 2.3 2.4 2.5 2.6 Introduction 7 2.1.1 7 History of RFID technology Architecture of the RFID Technology 8 2.2.1 RFID Tag 9 2.2.2 RFID Reader 10 Physical Principle Of RFID Technology 11 2.3.1 Magnetic Field Coupling: Near Field 12 2.3.2 Power Supply To A Passive RFID Tag 14 2.3.3 Antenna Impedance And Matching 15 2.3.4 Operating Frequency of RFID technology 16 2.3.5 Singulation Process 17 Communication Layers of RFID Technology 18 2.4.1 The Physical Layer 18 2.4.2 The Application Layer 19 2.4.3 The Strategic Layer 19 2.4.4 The Network-Transport Layer 20 RFID Application 20 2.5.1 Contactless Payment System 21 2.5.2 Electronic Article Surveillance (EAS) System. 22 2.5.3 Container Identification And Tracking 22 2.5.4 E-Passport And Document Identification 23 2.5.5 ChampionChip And Tag Implantation 24 2.5.6 Substitute For Bar-Code 25 2.5.7 Contactless Smart Card 26 2.5.8 Banknotes 27 2.5.9 Libraries 27 Known Challenges in RFID Technology 28 2.6.1 RFID Tag Cloning Attack 29 2.6.2 Physical Attack 29 2.6.3 Skimming Attack 30 x 2.7 2.6.4 Spoofing Attack 31 2.6.5 Relay Attack 31 2.3.6 Denial of Service (Dos) Attack 33 2.3.7 Clandestine Tracking 34 Counter Measures Against Known Challenges 35 2.7.1 RFID Guardian 35 2.7.2 RFID Blocker Tag 36 2.7.3 Labeling 37 2.7.4 Kill Command 37 2.7.5 RFID Zapper 38 2.7.6 RFID Clipped Tag 38 2.7.7 Faraday Cage 39 2.7.8 Authentication Protocols 39 2.7.9 Anti-Counterfeiting Technology 41 2.7.10 Physical- Layer Identification 41 2.7.11 Fingerprint Biometric Authentication 42 2.7.12 Controllable tag 43 2.8 Physical Layer Security 46 2.9 Summary of Various Mitigations and Their Drawback 44 2.10 Other Types of Mitigation Used for Physical Authentication 53 2.11 2.10.1 Iris Pattern Recognition 53 2.10.2 Body Odor Authentication 54 2.10.3 Facial Recognition 54 2.10.4 Fingerprint Pattern 55 2.10.5 Signature Pattern 55 2.10.6 Hand Geometry 55 2.10.7 Retina Pattern 56 2.10.8 Speech Pattern/Voiceprint 56 Integrating Various Physical Authentication Mitigation on RFID Card 56 xi 2.12 3 3.1 Introduction 59 3.2 Operational Framework 60 3.3 Review of Existing Mitigation 61 3.3.1 Physical Clipped Tag 62 3.3.2 Faraday Cage 63 3.3.3 Fingerprint Biometric Authentication 65 3.5 Project Methodology 68 3.4.1 Phase 1: Design and Fabrication of Tag 70 3.4.2 Phase 2: Fingerprint Acquisition and Matching 70 3.4.3 Phase 3: Code Development and Testing 70 Summary 71 DESIGN OF BIO-THENTIC RFID CARD 4.1 Introduction 72 4.2 Existing Mitigation Measure Analysis 73 4.3 Proposed Mitigation 74 4.4 Antenna Design 78 4.4.1 Antenna Coil 78 4.4.2 Clipped Joint 82 4.4.3 Biometric Authentication 83 4.4.4 Fingerprint Module Security Mechanism 84 4.4.5 Fingerprint Storage And Matching 85 4.5 4.6 5 58 RESEARCH METHODOLOGY 3.4 4 Summary Control Unit 86 4.5.1 AVR Atmega-8515 Microcontroller 86 4.5.2 Control Circuitry 88 Summary 91 RESULT AND ANALYSIS 5.1 Introduction 92 xii 5.2 5.3 6 Bio-Thentic Prototype Testing 93 5.2.1 Reader Response 96 5.2.2 Fingerprint Authentication 97 5.2.3 Tag Reading 98 Risk Assessment 98 5.3.1 Tag Manipulation 99 5.3.2 Clip Joint Circumvention 101 5.3.3 Fingerprint Manipulation 101 5.4 Risk Assessment Analysis 103 5.5 Summary 103 CONCLUSION AND RECOMMENDATION 6.1 Introduction 104 6.2 Contribution 105 6.3 Future work 105 6.4 Conclusion 106 REFERENCES 107 APPENDIX A Program code in Assembly language 117 APPENDIX B Program Flow Chart 138 xiii LIST OF TABLES TABLE NO. TITLE PAGE 2.1 Summary of Attacks on RFID Layer 34 2.2 Mitigation against Attack on the Physical Layer 45 2.3 Attacks and Its Mitigation Targeted At the RFID Physical-Layer 46 2.4 Effectiveness of Mitigation to RFID Challenges 49 2.5 Comparison of Various Authentication Mitigations Based On Integrative Property with RFID Card 57 4.1 RFID Physical-Layer Attack-Mitigation Analysis 73 4.2 Instruction Command for Fingerprint Storage 85 4.3 Instruction Command for Fingerprint Match 85 4.4 Control Output Indicator 90 5.1 Test Result of Bio-Thentic Card 96 5.2 Results for Authentication Testing 97 5.3 Bio-Thentic Risk Assessment 102 xiv LIST OF FIGURES FIGURE NO. TITLE PAGE 2.1 Typical RFID Architecture 9 2.2 Example of RFID Tag. 10 2.3 Typical of an RFID Reader 11 2.4 Lines of Magnetic Flux 12 2.5 Magnetic Loops around a Current Carrying Conductor 14 2.6 Power Supply Process for a Near Field Antenna 15 2.7 Tree Singulation Diagram 17 2.8 RFID Technology Communication Layer 18 2.9 Applicability of RFID Technology 20 2.10 A Typical Physical-Layer Security Breach in RFID System 28 2.11 New HMAC-Based Protocol 40 2.12 Authentication and Identification Framework 43 2.13 Samples of Controllable and Visible Tags. 44 xv 3.1 Operational Framework of the Study 60 3.2 A) Schematics Of Clipped Tag B) Garment Hang Tag. 62 3.3 Clipping an Antenna 63 3.4 Operational Process of Faraday Cage. 64 3.5 Examples of Minutiae Types 65 3.6 A)Example Of An OFTIR 3.7 Example of a Live-Scan Fingerprint. 67 3.8 Typical Algorithm for Minutiae Extraction 67 3.9 Flow Chart of Proposed Method 69 4.1 Overview of Proposed Measure 75 4.2 Implementation Flow Chat of the Proposed Method 76 4.3 Communication process of the proposed mitigation 77 4.4 Snapshot of CST 2010 antenna design 79 4.5 FR4 lossy material 80 4.6 S-parameter of the designed antenna 81 4.7 Snapshot showing the clipped joint 82 4.8 Fabricated Antenna Unit 83 4.9 Architecture of Atmega-8515 Microcontroller 84 4.10 Block diagram of the fingerprint module 87 4.11 Pin-out of Atmega-8515 Microcontroller 88 4.12 Schematics of control process 89 B) Image Geometry 66 xvi 5.1 Bio-Thentic Card prototype 93 5.2 Testing Procedure for Authentic User 94 5.3 Generic Testing Procedure 95 5.4 Worse case scenario of Bio-Thentic Card-physical state 100 5.5 Electrical manipulation of the clipped joint 100 xvii LIST OF EQUATIONS EQUATION NO. TITLE PAGE 2.1 Magnetic field strength 13 2.2 Energy range of RFID Tag 13 2.3 Optimal antenna coupling 13 2.4 Impedance 15 3.1 Gauss Law 64 CHAPTER 1 INTRODUCTION 1.1 Introduction Radio frequency identifier (RFID) is one among series of wireless technology gaining faster and wider adoption in our today society. portability, mobility, and flexibility in use. Unique to RFID is its In a bid to make life much easier and simpler, this uniqueness has triggered its integration into our everyday life. Traditional way of identifying object/products in the retail industry; bar-code, is gradually being replace by the RFID. Of more importance to the adoption of RFID is its ability to be integrated into conveyor system, container, inventory, and transport tracking system, time sensitive application, self monitoring application such as expiry date alerts, and anti-counterfeiting of product. In addition, the relatively cheaper cost of the technology also contributes to such increasing demand. Ironically, RFID unique properties have generated privacy concern and increasing security threats and attacks alike; which have attracted scholarly concern from researchers for the past two decades. Hence, various mitigations have been proposed to combat these challenges. Owing to the fact that the RFID system 2 constitutes four distinct layers (which are discussed in the following chapter), mitigations have also been structured to equate layer attacks. While the layers of the RFID system are been addressed, the physical-layer tends to receive less attention, and it has led to the success of most attacks. Researchers such as Juels (2006), Reiback (2005), Yahaya et al. (2010), e. t. c. have proposed measures to combat these attacks at the -physical-layer with focus on the reader-to-tag and tag-to-reader communication leaving the physical-layer vulnerable to unauthorized usage. 1.2 Problem Background The adoption of RFID technology into areas like physical access control have generated questions such as; ‘how can I know when my Card is being read’, how can the Card detect the authentic owner of the Card. Series of such question have trailed the stage of RFID technology. Yahaya et al. , (2009) proposed a framework upon which a Card can identify its authentic owner using a “biometric fingerprint match on Card” and a computer system for authentication. This is also similar to the model proposed by Fons et al. , (2006). Marquardt et al. , (2010) proposed a controllable tag system. They modeled different types of tag that can be controlled by the user at will. This is also similar to the clipped tag designed by Moskowitz et. al. ,(2007). Zanneti et al, (2010) proposed a “physical-layer identification” system of tag based on the principle of radiometry, which was termed PARADIS. They concluded that every tag has a unique fingerprint upon which they can be distinguished. 3 In all of the proposed mitigation however, the question of ‘who’ (how authentic is the authentic holder of the Card) authorizes the Card is yet to be answered. Zuo, (2010) concluded that the “survivability of the RFID system” should start from the security of each tag, noting that compromising attacks emanates from the tag. Langheinrich, (2008) identified “unauthorized tag readout” as the core of RFID privacy problem stating that authenticating the interrogating parties in RFID system is a technique for privacy concern. Therefore, the challenge of authorized Card use and reading constitutes the bane of the security and privacy issues in the RFID system. Albeit, such challenges can be protected against by proposing an enhance authentication system particularly, at the user-end on the physical-layer of the RFID system. 1.3 Problem Statement Attacks on the physical-layer of the RFID system have received minimum combative measure leading to the discouraging rate of attacks on it. Some of the existing measure tend to offer mitigation but failed to consider the authenticity of the user at the tag end of the system. Considering these limitations, satisfactory answers to the questions listed below needs to be purveyed in the process of this study: i. How authentic is the authentic Cardholder? ii. How can an authentic Cardholder dictate Card responds to interrogation? iii. How can an authentic Cardholder know when the tag is being read? iv. What happens to the confidentiality of the Card when it is stolen? v. How will this proposed method be evaluated, with respect to authentic authorization? 4 1.4 Project Aim The aim of this study is to improve the security level of the RFID system at the physical layer as well as ensure confidentiality in the use of RFID Cards by enhancing authentication of user at the tag end. 1.5 Project Objectives In order to accomplish the aim of this study; the following objectives must be achieved: i. To study and investigate existing mitigation measures on security and privacy of the RFID system with reference to the physical-layer. ii. To propose an enhanced authentication mechanism for authenticating user at the tag-end of the RFID system iii. To implement the proposed authentication mechanism and evaluate it effectiveness 1.6 Project Scope The following defines the scope of this study: 1) This study entails security issues relating to the physical-layer of a passive and semi-passive tag used in contactless Cards. 5 2) The proposed enhancement method will be based on three existing mitigation methods, which are clipped tag, Faraday cage and fingerprint biometric authentication. 3) The designs and fabrication of the system is limited to the physics of the tag antenna and not on the detail of the RFID tag itself. 1.7 Significance of the dissertation In this study, various mitigation measures for combating the challenges of the RFID system will be discussed. Furthermore, detailed analysis will be carried out on the specific three chosen measures, which will give insight to other researchers. The challenges of unauthorized tag read, tag use and even tag killing will receive appropriate mitigation. 1.8 Organization of report This thesis comprises chapters arranged in the numeric other of 1 to 6. The detail of each chapter is detailed as follows; Chapter 1 of this report gives the overview of this study, problem background, objective, scope, and problem statement of this study. Chapter 2 of this report covers the history and basic theory of the RFID technology as well as its importance in various areas of application. Security and privacy challenges and existing mitigation in the RFID system were also discussed in detail. 6 Chapter 3 describes the research methodology of this study. In addition, it also discussed the project methodology for the study. Chapter 4 of this report covers the design and fabrication process upon which the proposed methodology was framed. Chapter 5 of this report discussed the result of the design and fabrication process. It also discussed result of risk assessment carried out on the fabricated prototype. Chapter 6 covered the conclusion and recommendation proffered in this study. 7 CHAPTER 2 LITERATURE REVIEW 2.1 Introduction This chapter discussed the nature (with reference to the physical nature), various application area, and security and privacy challenges in RFID technology. Review of various proposed mitigation against these known challenges were also discussed as well as their respective limitation. A concise summary of mitigations to these challenges was also included in this chapter. 2.1.1 Brief History of RFID Technology The term RFID is used to describe any system capable of transmitting the identity of an object from a tag to a reader using radio frequency (RF) waves as communication medium. This can also include the transfer of stored data with some encryption function. RF identification can be traced back to Faraday discovery of 8 mutual induction between two conductors during the mid-nineteenth century and discoveries made around 1900-1940 in radio and radar technology. Radio frequency transmitting and responding as a means of identification can be traced to the Allied Fighters and Anti-air craft system during the Second World War. It was used to distinguish between friendly aircraft and the otherwise hence the name Identification friend or foe (IFF); where a correct signal transmitted is considered a friend, otherwise, a foe. Shortly after the Second World War, launching of the first commercialized use of the RFID took off in the 1960s (Haver, 2006). This led to various developmental works on the technology in the 1970s. The implementation of the RFID technology started in 1980s (Haver, 2006). From the 1990s to date, various application area of RFID technology have emerge and yet still, the technology is considered as ‘yet to achieve’ its possible application area. 2.2 Architecture of The RFID Technology RFID technology theory of operation is centered on the communication principle of radio wave. Like every other wireless medium of communication, RFID technology is composed of the transmitter and the receiver/responder but unique to RFID is the architecture of the communication units; reader and tag. The architecture of a typical RFID system is shown in Figure 2. 1. It consists of the reader, the tag and or the backend database and central control system. Extensively, an internet infrastructure can be integrated into it. 9 Internet Infrastructure Tag Reader Backend Database Control unit Figure 2. 1: Typical RFID Architecture. As shown in Figure 2. 1, the communication channel between the reader and the tag is a wireless medium. The backend database and the control unit could be integrated into one cabinet or in separate units. The backend database can be linked to Internet infrastructure for upstream and downstream activities. 2.2.1 RFID Tag It is the main composition of the RFID technology; the information for identification and communication is stored inside the tag. An RFID tag is a chip capable of transmitting and responding (hence the name transponder) to RF signal. Its components include an encoding circuitry, memory unit, antenna, communication control. Depending on the type, it could possess internal power unit or external (power drawn from the reader) power unit. These characteristics form the basis for the categorization of the RFID tag; active tag, passive tag, and semi-passive tag. The passive tag does not have internal power supply hence, draws it power (using the near field theory through its resonating circuit) from the reader, for data 10 communication and memory circuitry operation. An active RFID tag on the other hand, possesses internal power supply unit, which supplies power to its internal memory circuitry and data communication with the reader. The semi-passive tag is a hybrid tag characterized by the internal power supply for its memory circuitry but relies on the near field power supply from the reader for communication. RFID tags are designed in different forms and sizes irrespective of its categorization. Examples are illustrated in Figure 2. 2. A B C Figure 2.2: Example of RFID Tag. Figure 2. 2 shows three different types of tags. Tag labeled ‘A’, ‘B’ and ‘C’ is an example of tags used in contactless Cards, implanted in pets, and embedded in documents respectively. Tag can take any form and size but it is also a function of the application requirement. The antenna being the component of communication, also influence the size by design. The category of tag used (either passive or active) also influence the size of the tag design; the inclusion or exclusion of battery. 2.2.2 RFID Reader This is the second composition of the RFID physical layer. It reads data information contained in the tag. It communicate with the reader by transmitting and receiving (hence the name transceiver) RF signal; a process called tag querying or 11 interrogation. The reeader communicates with the tags by moduulating a RF carrier using either a doublee –sideband amplitude shift keying (DSB-AS SK ), phase reversal amplitude shift keyiing(PR-ASK), single-sideband amplitude sshift keying (SSDASK) in the format of o pulse interval coding. A typical reader com mprises an antenna, system interface, a crryptographic encoding circuit unit, communiication control unit, and power supply unnit. A typical internal composition of a reaader is described in Figure 2. 3. Figure 2.3: Typical of an RFID Reader. The communnication channel of the various module connstituting the RFID reader depicted in Fiigure 2. 3, shows that the link between the ccontrol module and the computer interfaace is a full duplex routing (can transmit and receive signal simultaneously), as aggainst the internal communication between thhe HF interface and the control unit whichh is half duplex. 2.3 Physical Prin nciple of RFID Technology The antenna of o a passive tag is used to harness energy from m and communicate to the transceiver. Thhe process in which a passive or semi-passivee tag responds back 12 to a reader is called backscatter, b a process of “modulation of the reeflection coefficient of its antenna” (Hawrrylak et. al. , 2008) back to the reader. 2.3.1 Magnetic Fieeld Coupling: Near Field The passive RFID R tag relies on the near field strength of thhe reader for power. This near field princiiple is similar to the mutual coupling in a transformer. Mutual coupling exist whenn electric current passing through a coil iinduces voltage on another coil within thhe generated magnetic field. “In a near-fieldd RFID system, the interrogator has an anntenna that acts as the primary coil which gennerates the magnetic field. Near field RF FID tag (a tag within close proximity) derivves power from the induced current due to t the magnetic field generated by the interrrogator, the primary coil’’ (Hawrylak et. al. , 2008). The generated magnetic field consists of lines of magnetic flux (whichh is dependent on the number of coils) in cloosed circular pattern (cylindrical in shape) as illustrated in Figure 2. 4. Figuure 2.4: Lines of Magnetic Flux (Haver, 20006) This field sett-up by the radiating interrogator can be classified into two components: inductioon field and radiation field. “The inductionn field is important only in the immediaate vicinity of the radiating interrogator; thee energy associated 13 with it pulsates back and forth between the radiator and the near--by space. At large distance, the radiatorr field is dominant; it represents a continuual flow of energy directly outward from m the radiator, with a density that varies inversely with the square of the distancce and dependent on the direction from the source (Silver and James, 1949). “The magnetic m field strength (H) at distance “x” allong the X-axis can be estimated” (Haverr, 2006) by equation 2. 1. . . . Equation2. 1 Where: N= number off coil windings of the tag R= the antennna radius x = the distancce from the center of the coil in the x-directioon I= Electric cuurrent From equationn 2. 1, “x” can be redefined as the energy rrange of the tag. It can be calculated usinng the equation 2. 2 below, which is derivedd from equation 2. 1 by making “x” the suubject of the formula. . . . Equatioon 2. 2 The power received r by the passive tag through mutuual coupling varies inversely proportionaal to “x” i. e. the higher the value of “x”, thhe weaker the field strength available forr the tag and by extension, the higher the tim me required for data transmission. For optimal antenna coupling, equation 2. 2 can be redefined to satisfy round coil criteria. = ई × 2 …Equatioon 2. 3 14 Therefore, thee value of “R” given by equation 2. 3 definees the optimal range for antenna radius. This T range can thus be seen as a dependent ffactor on the energy range of the tag. 2.3.2 Power Supply to a Passive RFID Tag When a connductor is place within the magnetic fieeld set-up by the interrogator, a degreee of magnetic force is experienced by the coonductor which sets its electron in constannt motion. The direction of the magnetic field and the current in the conductor is illusttrated in Figure 2. 5. Figure 2. 5 Magnetic Loops around a Current Carrying C Conductor (Richard, 2008) The force exxerted on the conductor by the magneticc field is directly proportional to the lenngth of the conductor. The current flowing inn the conductor due to the constant electron motion can then be connected to charge a capacitor. This is depicted in the Figuree 2. 6 below with the conductor represented by the antenna coil of the tag. 15 Ta Figure 2. 6: Power Supply Process for a Near Field Antenna (Kllaus Finkenzeller, 2010) As shown in Figure F 2. 6, the magnetic field (H) from the R Reader (Ri) couples the antenna of the taag (Ta) forms the communication medium. This field in turn charges the capacitors C1and C2, which serves as power source forr the RFID chip. In general, the power received r by the RFID tag is dependent onn the power of the transmitting antenna, the distance between the Reader and the tagg, and the efficiency of the tag antenna. 2.3.3 Antenna Imp pedance And Matching As discussed above, the magnetic field set-up by the interrrogator powers the tag through mutual induction. Additionally, the power receiived by the tag is dependent on the effficiency of the tag antenna. In order to atttain this efficiency, between the interroggator and tag coil, they must be matched or tuned at same resonating frequency; a process called impedance matching. Thee term impedance is used to describe thee relationship that exists between voltage and current in an alternating current at any point in time. ȡ= ॥ ூ॥ . . . Equattion 2. 4 16 From equation 2. 4, it can be deduced that, maximum current (Imax. ) flows when the impedance tend to minimum (Zmin. ). This happens when the antenna resonates on pure resistive impedance (when the capacitive reactance is equal to the inductive reactance). So for optimal matching of the tag antenna, the impedance “Z” must be minimal. 2.3.4 Operating Frequency of RFID Technology RFID tag can be classified based on the frequency they operate. Generally, they are classified into three categories namely; the low frequency (LF), high frequency (HF), and the ultra high frequency (UHF). The LF class of tags primarily operates at 125 kHz, and within the range 30 kHz and 300 kHz. The HF RFID tag (which is the commonly used tag) operates primarily at the 13. 56 MHz, and within the range of 3 MHz and 30MHz. This is similar to the “Federal communications commission (FCC) stated boundary of 13. 56 MHz +/-17 KHz Industrial Scientific and Medical (ISM) use” (CIRCULAR, 2010). The UHF class of RFID tags range between 300MHz to 3GHz, albeit, the UHF tags in the Gen-2 protocols operates in ranges of 866MHz and 960MHz but it applicability varies in different countries (Hawrylak et. al. , 2008). These operating frequencies determine the data rate and the read range of the RFID system. Based on frequency range, the operating read range of the passive RFID tag operates at 30cm, 1m, and 7m for LF, HF and UHF tags respectively. However, for an active tag, the nominal range could span 100m since it does not require the reader to power its internal circuitry (LIANG, 2010). 17 2.3.5 Singulation Process The RFID reader continuously polls for tag. In the process, it creates an interrogation zone for activating a tag. However, collision occurs when a there are multiple tags in the zone. The process of distinguishing individual tags in such state of collision of RFID tags is called singulation process (singling out a particular for interrogation). Juels et al. , (2006) proposed a tree walking singulation method for singulation. In their method, the tag identifiers were arranged as leaves of a binary tree (Dolev et. al. , 2008) as shown in Figure 2. 7. Figure 2. 7: Tree Singulation Diagram From Figure 2. 7, each leaf represents a tag ID. With this unique binary tree ID of tag, take “h” for instance which is 101, can be located. In this way, a reader can easily select a particular tag through the leave nodes to the individual tag of interest. 18 2.4 Communication Layers of RFID Technology RFID communication comprises of four distinct layers; physical layer, the network and transport layer (also referred to as communication layer), the application layer, and the strategic layer. A typical schematic of the RFID layers is shown in Figure 2. 8 Figure 2. 8: RFID Technology Communication Layer (Mitrokotsa et, al. , 2010) The structural content of each layer is illustrated in Figure 2. 8. It also shows that the physical layer forms the bedrock on which RFID system is structured. This thesis is centered on enhancing authentication at the physical layer thus establishing the first line of defense at the physical layer. 2.4.1 The Physical Layer The physical layer comprises the RFID device (RFID tag and reader) and the radio frequency interface. RFID tags are considerably small in size, and they communicate through the air interface with the reader. Thus characterized by poor physical layer security and hence, low restiveness towards physical manipulation. These attacks could aim at permanent disabling of tag, tag removal, antenna 19 disruption, tag destruction, unauthorized killing of tag, unauthorized use of tag, unauthorized reading of tag, passive interference, active jamming and relay attacks; are associated with the physical layer (Mitrokotsa et. al. , 2010). One major concern at this layer is the ability to distinguish an authentic user from a malicious one; Authentication. 2.4.2 The Network-Transport Layer Network-Transport layer describes the communication procedure and protocol of the RFID technology. The communication process of the RFID is a twoway channeling system (from the reader to the tag and the tag to the reader). Attacks on this layer could be at the tag end, the reader end or the network of communication. Such attack includes but not limited to; tag cloning, relay, spoofing, skimming, eavesdropping and network protocol violation. 2.4.3 The Application Layer RFID Application layer contains the information inside the tag and the method of communication and operation. Attacks at this layer are, but not limited to; unauthorized tag reading, tag data modification, virus/malicious code injection, and middleware attack. 20 2.4.4 The Strategic Layer This layer includes the organization lay-out of the design of infrastructures and application (Mitrokotsa eet. al. , 2010). Attacks in this layer include social engineering, corporate espionage, privacy, and targeted security breach. 2.5 RFID Application The influence of RFID technology in applications has grown such that it is integrated into our every-day life. Figure 2. 9 depicts examples of areas of RFID application that pertain to our day-to-day business activities, domestic utilization, and even health care deliveries. Contactless payment system Logistics Management Container identificartion contactless smart cards substitute for bar code Electronic Article Surveilance System RFID TECHNOLOGY APPLICATION Tracking Human and pet identification E-passport and Document identification Anticounterfeiting Figure 2.9: Applicability of RFID Technology 21 RFID technology is seen as a possible substitute for the traditional bar-code used in various retailing, domestic, industrial, and educational outlets as pointed out in Figure 2. 9. Common applications of RFID include E-passport, Electronic Article Surveillance (EAS) system; contactless smart cards, payment and tolling system, industrial automation, container identity (e. g. supply chain, wholesale and retail inventory and material management), asset tracking, automobile ignition system, ticketing, access control, human and livestock tagging, Library management system, anti-counterfeiting system e. t. c. 2.5.1 Contactless Payment System This is the process of paying or transacting using a cashless medium. The Exxon-Mobil speed pass employs RFID to speed customer through fuel purchase (Thornton et. al. , 2006). A passive RFID tag is mounted on the vehicle or attached to the key chain of the consumers which is activated by a reader attached to the pump of the fueling station. The reader hand-shakes with the tag and reads the encrypted number. This number is then sent through the linking cable between the reader and the pump to a satellite receiver of the gas station. This is then sent to a datacenter where the authorization, verification and accounting are done. The E-Z pass toll system is similar to the speed pass. When a car enters the toll zone, the car-mounted tag is activated by the reader antenna in the zone. An encoded number is then communicated back to the reader which is further transmitted through a secured channel to a back end database and control system. 22 2.5.2 Electronic Article Surveillance (EAS) System. One problem in the retail industry is dealing with product leaving the store without proper payment, be it intentional or not (Rieback at. al. , 2005). The idea behind the EAS system is the AES system is to limit shop-lifting through the adoption of RFID system. Passive RFID tag is integrated into items, upon purchase, the tag is either deactivated or notification is made for verification. This is achieved with the aid of the reader setting up an interrogation zone. When any item carrying a tag passes the door/entrance/exit, an alarm or surveillance system is activated. This is then deactivated upon purchase (Haver, 2006), (Juels, 2006), and (Mickle, et. al. , 2007). 2.5.3 Container Identification and Tracking The adoption of RFID system in container identification in industries as an appropriate monitoring system can improve the industry operation efficiency as well operational cost (Chiu, 2009). For container shipping application, a typical RFID device is operated in an ultrahigh frequency or microwave range (e. g. 900MHz or 2. 45GHz in the U. S. A. or 5. 8GHz in Europe). RFID recognition system in container is applied by mounting the tag on the container/item/pallet, through hanged read/write or write/read equipment installed in the forklift or handset or a handset read write equipment to recognize the dynamic information on the tag. The information read can be transmitted to a monitor system or control database. RFID can handle the information management about cargo flow effectively. Read/write equipment is set on the door of the warehouse. Every cargo unit has embedded RFID tag and all the information each tag is stored on a central control computer of the warehouse. The read/write equipment detects and reports 23 information about every cargo and automobile working and which cargo is transported (Shi Yong-Dong, 2009). Through effective transport and inventory tracking, retailer can improve inventory and timely replacement. Transponders can monitor commodities and report for validity period, expiration date, and quality deterioration. Wal-Mart is making full use of RFID technology gradually eliminating the use of bar-code to further enhance the efficiency of retail chain (Haver, 2006). 2.5.4 E-Passport and Document Identification The report from the 9/11 commission stated that (Kean et. al. , 2002), travelling documents are considered as important as to a terrorist as do a weapon. Documents with RFID chips and a secure network environment to exchange data are “deemed more secure and less prone to counterfeiting” than conventional nonelectronics document (Monica and Greis, 2009). The data-page of machine-readable passport is embedded with 44 characters bearing the name of the holder, country and passport number. The integration of RFID into machine readable document (MRD) therefore balances the need for electronic data storage with automated document control (Monica and Greis, 2009). The e-passport contains a contactless RFID chip and an aerial embedded on one of its pages (Meingastet. al. , 2007) and its cover has a built-in metallic shield/Faraday cage to prevent unauthorized reading of the tag inside the passport. The chip contains an operating system (OS), application program and a set of data grouping conforming to the international civil aviation organization (ICAO) logical data structure (Haver, 2006). Since 1998, Malaysian passport have included a chip containing image of a thumbprint of the passport holder. In 2003, e-passport contains extracted fingerprint information only (Juels et. al. , 2005). ICAO standard specifies face recognition as globally interoperable biometric identification verification for travelling document. 24 Thus, e-passport contains digitized photographic image of the bearer. When flying through Kuala Lumpur airport, a Malaysian citizen passes through an automated gate that reads the thumbprint from the chip and compares it to the thumbprint on the scanner. Over 5,125,000 e-passports are in circulation with RFID tag embedded in circulation (Juels et. al. , 2005). The decision to implement e-passport in the U. S affects all member of the U. S visa waiver program. An analogous passport system utilizing RFID with fingerprint integrated as a biometric data is also implemented in the European Union (Haver, 2006). By the year 2017, all passports used in the U. S borders will be electronics (Vollmer, 2006). 2.5.5 ChampionChip and Tag Implantation The championChip is a device laced to the shoe of an athlete’s when running in a race such as marathon. This device consists of passive transponder that can only be read at a short distance (Vollmer, 2006). Electronic product code generation2 RFID tag built into the tires side walls enable race organization to which tire a team uses during a race and allow the manufacturer, Dunlop, to track its own tires through supply chain (Swedberg, 2009). RFID reader is stationed at the start and the finished line to record the time of each tag across the finished line. This eliminates the need for manual physical record and hence, enhances race time record accuracy (Swedberg, 2009). Similarly, RFID application in health care could reduce the number of error recorded in tagging medical objects, increase the efficiency and effectiveness of paramedical staffs (AHSAN, et. al. , 2010). In addition, the propensity of data sharing and confidentiality in the medical field can be greatly improved with the integration of RFID technology. 25 In view of the above, “Mu-chip” (the smallest passive transponder about 0. 4mm) can be embedded into a paper sheets to track document which can only be read at a range of a few centimeters due to the size of the antenna. Another smaller size of RFID tag is the Veri-chip. It is about the size of a grain of rice and it is often implanted into human being, pets, as well as live stocks (Vollmer, 2006). Implantation chips can also work in identifying wandering Alzheimer’s patients who got out without identity or cognizance of their location and destination. On October 14, 2004 (Simson and Holtzman, 2005), an article titled “identity chip planted under skin approved for use in health care” was on the New York Times and much other publication. Veri-chip was cloned in less than ten minutes by a Canadian hardware developer for the purpose of an article in Wired magazine (Organization, 2008). According to Monahan and Fisher, (2010) 900 hospitals have agreed to participate in the Veri-Med system, and about 600 people have received implant while the company has begun direct-to-customer campaign in targeted market such as South Florida (Kerr, 2007). Implantation of RFID chips into human being, pets and livestocks, is yet to gain wider adoption in places like Africa, but with the gradual shift in technological paradigm, RFID technology may receive wider acceptance with implantation being a major part due to the level of crime and the urgency in medical data security. 2.5.6 Substitute For Bar-Code Bar-code has been the common technology for identification in retail outlets since the 1970s (Thornton et. al. , 2006). Its effectiveness in price at the point of sale (POS) in commercial centers has generally led to its adoption. RFID technology on the other hand is seen as a substitute for bar-code due to its relative flexibility, contactlessness, relatively large distance of operation (not necessarily line of sight), event tracking ability (even through an errant bag), and mobile-scan-ability; as fast as 26 30mph (Thornton et. al. , 2006). Bar-code uses the Universal Product Code (UPC), which defines 5digits for both manufacturers and item resulting to a limit of 100,000 items. This allows for 10,000,000,000 products. UPC does not also allow serial number to be encoded into the bar-code. RFID technology adopts the electronic product code (EPC), an EPCglobal organization identifier (GID-96) format. The GID-96 has 96bits (12bytes) of data. This is categorized into four separate fields: 28bits General Manager Number that identifies the company or organization, 24-bits object class that breaks down products into group, 36-bits serial number that is unique to an individual object, and an 8-bits header that is used to guarantee the uniqueness of EPCTM code. “This totally allow for 30,939,155,745,879,204, 468, 201, 375 unique items” (Klaus Finkenzeller, 2010). As a substitute for bar code therefore, an RFID technology tends to provide substantially more information such as expiration date e. t. c (Haver, 2006). The relative cost of RFID tag have prevented the expected immediate substitute for barcode, though companies like Wal-Mart is encouraging their major suppliers to integrate RFID into their supply chain. Owing to this, the forecasted substitution of the RFID technology in the retail world is promising. 2.5.7 Contactless Smart Card The traditional contact-based Card relies on the communication of electrical contact linking the reader to the circuitry on the Card. RFID technology on the other hand establishes communication wirelessly using radio frequency between the reader and the tag. Since no physical contact is required for communication, hence the name contactless Card. This area of RFID application has gained wider adoption in physical access control system, and cashless payment processes. Example of such includes toll payment, e-passport, building access control, and so on. In 1994 and 1995, around 1million of contactless smart Cards were produced per year for public transport application, the volume rose to 4million per year in 1996 and 1997 (Klaus 27 Finkenzeller, 2010). In building access control, RFID tag can simply be called a key for access (LIANG, 2010). This can be seen in proximity and vicinity Cards. 2.5.8 Banknotes In a bid to combat criminal challenges in the banking system, “the European Central Bank (ECB) has proposed to embed small, radio frequency emitting identification (RFID) tag in Euro banknotes by 2005 as a tracking mechanism for law enforcement agencies” (Juelsand Pappu, 2006). as well as internal security measures against counterfeiting. “The ECB opted to issue banknotes up to the relatively high denominations of 200 and 500 Euro (Juels and Pappu, 2006). 2.5.9 Libraries The widespread of RFID technology have also infiltrated the library cataloging and book searching process. “The technology promises to relieve repetition strain injury, speed patron self checkout, and make possible comprehensive inventory” (Molnar and Wagner, 2004) and it has seen a considerably wide adoption in Library systems. Among these libraries includes “Santa Clara City Library, and the Eugene, Oregon public library have already tagged every book, tape, CD, or other item in their collections” (Molnar and Wagner, 2004). 28 2.6 Challenges In RFID Technology The major challenges facing all wireless technology also applies to RFID. Unique to RFID technology are threats such as tag cloning, tag size, e. tc which is due to the inherent vulnerabilities of an RFID system in addition to its privacy concerns. This thesis focuses on the challenges facing the physical layer of the RFID technology. Figure 2. 10 shows a typical attack on the physical layer. Figure 2.10: A Typical Physical-Layer Security Breach in RFID System (Soon and Tieyan, 2008) From the Figure 2.10 above, the attack on the physical layer can be categorized into two; attack to compromise system security, and attack to prevent the tag from being detectable. Attack at the gathering phase such as skimming, active eavesdropping; can be described as the primary stage of system security compromise. 29 2.6.1 RFID Tag Cloning Attack Cloning or counterfeiting of tag is simply forging the data illicitly gathered from an authentic tag into another tag usually a blank tag. Cloning of tag is one of the possible end products of skimming attack. Since a RFID technology assumes any tag with the ‘right’ information is authentic, a cloned tag can therefore act as an authentic one, since validity of EPC is at face value (Juels et. al. , 2005). In a bid to reduce cost and size of RFID tag, most of the commercial RFID tag lack security protocol. This leaves the tag vulnerable to cloning and data tampering (Mohan, 2008). Cloning a tag is a process, and it can be achieved through scanning of tag or gaining access to appropriate tag database. If the unique identifiers in a manufacturers EPC are static (for example if they are sequential), an attacker can simply device a guess work to fabricate another tag base on the extracted information of the authentic tag (Juels et. al. , 2005). This is made possible if the tag have multiple write capacity and no cryptographic security measure (thus, no logical-layer resistance) to cloning. Although RFID tag may not contain strong encryption, it offers a simple symmetric-key cryptography which can go a long way in resisting tag cloning (Juels, 2006). EPC tag include PIN-based protection both on tag disablement (killing), which can be re-designed to serve as a tamper-proof (such as trusted platform module) to solve cloning problem. There are various anti-tag cloning protocols proposed and which tend to effectively prevent cloning attack. 2.6.2 Physical Attack. Like every other integrated circuit, RFID technology is exposed to physical attack. A close look at the architecture from the attacker perspective will reveal the 30 delicate location of the antenna and even the RFID tag itself. Depending on the intention of the attacker, physical attack could range from trying to explore manufacturer product, to complete destruction of tag. For instance, placing a tag inside in microwave oven is a direct way of frying a tag while a simple EMP practice could damage the internal circuitry and even the tag as well. Combating physical attack is a rather big challenge as it falls within the tag safety which is a general concern with technology. Tag tamper proof or shielding can serve as a measure against some types of physical attack. 2.6.3 Skimming Attack Skimming means surreptitious reading of tags. If a tag lacks proper security measures, it will respond to any reader even unauthorized ones. By design of RFID, transponders are remotely readable. This opens up RFID to skimming attack. Skimming attack is done by reading the data of the tag without the authorization of the tag holder. This attack exploits the promiscuity of an RFID tag. An RFID tag does not have the intelligence to decide when to function or not, and so, it continually transmit beacons to any reader available to it. A malicious reader can then disguise as a genuine reader with the ‘authorized’ identity, to harness data from the tag. Skimming attack is a major tool for exploiting vulnerabilities in RFID technology (Meingast et. al. , 2007). Skimming attacks are feared as they may be part of an RFID bomb (Haver, 2006). Bombers may use this attack to scan for a particular RFID tag in a targeted vicinity of radius coverage before detonating an explosive. Skimming attack can be prevented using shared secret (Haver, 2006); demanding a reader to authenticate itself to a tag before divulging any information out to the reader. 31 2.6.4 Spoofing Attack Adversary may be able to create ‘authentic tag by writing ‘correct’ data to a blank or rewritable RFID tag (Haver, 2006). The attacker masquerades as a reader and sends a query. It then obtains response from the tag. When the legitimate reader queries the tag, the attacker will send the obtained response to the reader. Researchers from the John Hopkins University in collaboration with the RSA laboratories (Thornton et. al. , 2006) succeeded in unlocking a vehicle immobilizer system by using reverse engineering of the algorithm, brute-force the key for a tag and then simulate its software. The ingenuity of this method is that you are simulating the exact mechanism of black box. The proposed algorithm (Wang, 2008) can prevent spoofing attack by the authenticating factor NR1¶R, where NR is the legitimate reader and N’R is the masquerading reader query. This satisfies the condition of a secured system: system should be secured if everything except the key is known. Spoofing attack can best be totally prevented using a cryptographic protocol with sufficiently long randomly generated keys. 2.6.5 Relay Attack This attack can also be referred to as a Man-in-the-middle (MITM) attack. It is a technical way of fooling RFID tag and reader, as though they are communicating with each other. The attacker devices two units; a malicious reader which is called a Mole and a malicious tag called Proxy and both are connected via a communication link. The mole is set to interface with the authentic tag while the proxy interfaces with the reader. The Mole initiates communication with the tag, and then sends the response to the proxy. The proxy then forwards the response to the authentic reader. The fooled authentic reader sends back its response to proxy, which forwards it to the authentic tag through the Mole. The relaying process continues until the desired output is achieved while illicit information is gathered for malicious use. Hancke, 32 (2006) implemented a practical relay attack against a contactless smart Card using a self built hardware. Relay attacks can be performed without the knowledge of the Card holder and even the reader, this makes it more difficult to detect. In addition to its difficulty in detection, the proxy and the mole may not follow any standardized protocol of design. Basic security premises for RFID such; as tag read by any reader is genuine (Haver, 2006), and the read range of tag for most application is limited (physical proximity between reader and tag), failed a MITM attack (Peris-Lopez et. al. , 2010). Simple counter measure to relay attack includes push button, removable Faraday cage, signal strength of communication, “crypt-analyzing distance-bound protocol” (Peris-Lopez et. al. , 2010), and single-bit challenge and single-bit response distance-bound protocol can be a preventive measure against relay attack. Some attack adopts complete reader/tag customized hardware system which may not be standardized thereby possessing the ability to operate beyond specified frequency. Such can be fabricated to attack application even at a longer range. Israeli Electronic voting system was intercepted using similar mechanism (Oren and Wool, 2010). In same manner, an RFID enabled contactless smart Card was demonstrated (Mohan, 2008). In this case, relay attack was carried out during the communication between authorized tag and reader. Hancke and Kuhn (2005) while describing a possible counter measure against relay attack argued that the time introduced by the relay system can be a detective point of an attack. They concluded on the basis that measurement can be done by a verifier with respect to time sensitivity. Another approach to relay attack is the use of two-factor authentication architecture (Haver, 2006). 33 2.6.6 Denial of Service (DOS) Attack A denial of service in RFID service could be described as operating frequency jamming attack which could be technical or systematic or both; all entails compromise of availability of resources. A technical DOS could be sending multiple requests to a reader in order to drain its power. It could also mean, jamming the operating frequency of communication between the reader and the tag. This type of attack is aimed at preventing communication between the tag and the reader. The systematic DOS could be in the form of physical denial of access by damaging or tampering with the process of communication which could be through the removal of power supply from the reader, or tampering with the tag itself. Viruses could be another form of denial of service in physical access control. RFID being a radio frequency channel of communication is the vulnerability being exploited. The goal of this attack is to prevent availability of service of the system. A DOS attack an also be performed by replying to every request during the singulation process like a full blocker tag. By doing this, the reader detects a collision and is unable to singulate a tag (Haver, 2006). Tag destruction is another way of performing a DOS attack, since a dead tag tell no tale. Zhou and Huang (2007) suggested two types of DOS attack. They include; x Denial of reading: prevent authorized user from reading an RFID tag x Denial of authentication: prevent reader from authenticating user/tag 7RQDQG6DßVD(2008), described how HMNB protocol can be used to prevent desynchronization attack. This is accomplished through mutual authentication between the transponder and the reader, which keeps the transponder untraceable. Chien (2007) proposed an authentication protocol to combat de-synchronization attack. The integration of trusted platform module could be used to protect a physical DOS on reader and or tag. 34 2.6.7 Clandestine Tracking/Inventorying The word clandestine is used to describe a secret or illicit acquisition of information usually for the purpose of subversion or deception. In the case of RFID technology, such an act can be carried out without the necessity of a line-of-sight inconveniency. This is one of the major privacy concern (Rao, 2007) in RFID technology. The EPC network identifies good uniquely but does not provide explicit protection of good in transit which is being clandestinely tracked (Vartak et. al. , 2007). Table 2. 1: Summary of Attacks on RFID Layer RFID- Physical layers Network- Application Strategic transport Attack Physical Cloning × × Spoofing × × Skimming × × Eavesdropping × of × × Denial Service Relay Clandestine tracking × 35 Table 2. 1 gives a detailed summary of attacks on the four layers of the RFID technology. Most of the attacks on RFID system apply two or three of the RFID system layers, as pointed out in the table. However, attack such as denial of Service and physical attacks are affects all the layers of RFID system. 2.7 Counter Measures Against Challenges In this section, detailed discussion on various proposed mitigation measures against the challenges in the RFID system is given. 2.7.1 RFID Guardian RFID guardian was proposed by Melanie R. Reiback, Bruno Crispo, and Andrew S Tunenbaum (Rieback et. al. , 2005). The Guardian addressed issues such as denial of service, and privacy concerns while still enhancing the prevention of RFID ubiquity vulnerability exploitation. It is a portable battery powered device that mediates interaction through selective frequency jamming and spoofing between RFID reader and a transponder (Wang, 2008) capable of two way communication (Rieback et. al. , 2005). It is carried by a user and performs all security functions necessary for secure communication between reader and transponder. It establishes a privacy zone around the user in which only authenticated readers are allowed access, by acting like a reader, querying tag and decoding tag response. An RFID guardian integrates auditing, key management, access control and authentication, some of which were in new security properties of RFID (Rieback et. al. , 2005). Its main advantage as compared to other security measures for a transponder is its flexibility (Haver, 2006). User can influence the security level via guardian user interaction. 36 However, one main disadvantage accrued to RFID guardian is range. Since it is expected to guard all tag in the user vicinity, its range should be between 1-2m. This is a violation of ISO 14443 reader range specification of 10cm. Also, the guardian itself represents a single point of failure; if the guardian fails or compromises, the user is unprotected and it can also be easily lost or even forgotten (Haver, 2006). Integrating RFID guardian into a PDA (for instance) could reduce this weakness but not prevent it. Being a battery powered device, an attack could target draining of its power by flooding the communication zone with series of irrelevant communications. Furthermore, it does not guarantee an unauthorized reader from knowing the existence of the tag. 2.7.2 RFID Blocker Tag This was proposed by Juels, Rivest, and Szydlo (Juels et. al. , 2003). It simulates the full sets of 2k possible RFID-tag serial number. It has the ability to block the RFID tree-walking singulation algorithm protocol used by the reader to select a particular tag. It does not involve in any active form of jamming rather, by participating in the tag-reading process in a super compliant way to perform passive jamming (Juels et. al. , 2003). The blocker tag simulates the full spectrum of the possible serial number of the tag thereby obscuring the serial number of other tags. Blocker tag may be used to establish a save zone around a tag, preventing tag from being read. In order to make blocker tag more flexible, it is possible to implement a form of selective blocking (Haver, 2006). Hence a blocker tag helps to protect the privacy of the user from a malicious hidden reader. The principal point of weakness of the blocker tag is the lack of flexibility (Haver, 2006). Reliance on a blocker tag in a sparsely populated tag and reader environment does not prevent tracking of the tag and even active jamming. Blocker 37 tag therefore can be said to provide a temporary solution to privacy concerns and lesser or no security solution to RFID tag in the RFID system. 2.7.3 Labeling Labeling a tag or content containing RFID tag is one way of informing a user of the presence of the RFID tag. This is a major awareness ground upon which the privacy of RFID system is elucidated. This makes it possible for users to make further steps to protect, prevent and or avoid if necessary its usage. It was accepted as a basic means of privacy protection and also, labeling is also stated as part of the RFID bill of right (Haver, 2006). While it informs the authentic user of its presence, it also announces itself to a malicious user. Hence it complicates issues for security unravelment. Although, it works for privacy concerns but aids the exploitation of the vulnerability of the system by an attacker. 2.7.4 Kill Command Some RFID tag has built-in kill command (Haver, 2006). Auto-ID center and EPC global created a kill-command specification for permanent tag inoperability (Mitrokotsa et. al. , 2010), some of which requires 32-bit password; a Class-1Gen-2 EPC standard tag for instance. It implies that a tag can be destroyed or killed by sending a special kill-command and including the right coded password. The inclusion of the password is to prevent unauthorized killing (Haver, 2006) as well as enforcing user confidentiality (Kolias et al. , 2009). It also exposes the tag to unauthorized killing by a malicious adversary. 38 2.7.5 RFID Zapper This is another method of enhancing the privacy in RFID technology. An RFID zapper practically creates an electromagnetic impulse (EMP) within the boundary of its influence (MiniMe, 2006). They (MiniMe, 2006) demonstrated through the use of a set-up EMP from a low cost disposable camera. Zapper can destroy the tag without necessarily altering the product carrying the tag (Haver, 2006) as against a microwave oven. Another quick reference to zapper is that it is portable, hence can enable destruction of tag at the point of purchase of goods. 2.7.6 RFID Clipped Tag Destroying or killing of tag provides solution to privacy concerns in RFID since a dead tag tells no tale. This will be could be efficient when combined with labeling. It however eliminates the possibilities of post point of purchase or sale service, as well as recycling/ re-use which is one of the dynamics of RFID technology. To support such post point of sale service, RFID clipped tag was proposed by Paul A. Moskowitz, Andris Lauris, and Stephen S. Morris (Moskowitz et. al. , 2007). The clipped tag can be said to be was designed for privacy protection at the user-end. The concept is based on the principle of making the antenna of the tag removable/detachable. This will psychologically create a privacy protection as well eliminate possibilities of distance reading but logically, the tag is still active. This approach provides privacy protection but limits the utility of the tag (Haver, 2006). Hence it worked efficiently for privacy concerns and still provides room for post point of sale negotiation it does not provide any security guide or measure. 39 2.7.7 Faraday Cage Faraday cage is an enclosure designed to exclude electromagnetic field (Wu and Alamo, 2004). The concept is based on the fact that some material does not allow radio frequency to pass through them by blocking the signal of absorbing it. Thus keeping an RFID tag within such enclosure will prevent the tag from being read (LIANG, 2010). This is also another method of temporarily disabling the tag which is practicable for Cards used in access control system (for instance, a wallet with lined metal foil can prevent tag inside it from being read), and contactless Cards in general. This method does not ensure the identification of authorized user but prevent unauthorized tag reading. It could work more efficiently for privacy concerns when combined with labeling. 2.7.8 Authentication Protocols Various authentication protocols were proposed to combat skimming attack. Wang Shang-Ping (2011), proposed an authentication protocol on new HMAC-based protocol as advancement on the ones proposed by Gao et al. (Gao et. al. , 2008), Chen et al. (CHEN et. al. , 2006), and Y. C. Lee et al. (Y.-C. Lee, 2009). The new Hash-based Message Authentication Code (HMAC-BASED) protocol in which H was assumed to be a one-way hash function (Shang-Ping, 2011) could also be used to prevent skimming attack. BurrowAbadiNeedham89 (BAN) (Annette, 2007) logic was adopted for this new HMAC-based protocol shown in Figure 2. 11. 40 Figure 2. 11: New HMAC-Based Protocol (Shang-Ping, 2011) Challenge stage: as shown in Figure 2. 11, the RFID reader generates a random Nonce NR, which is sent as query to all tags. Response could be no-tag, onetag or multiple-tag. “Binary search algorithm” (Wang, 2008) is used to select a tag to communicate with the reader. T-R Response: the chosen tag generates a random nonce NT and then compute =HID( O, NT, NR), where ID is the identifier of the tag. Tag sends NT and to reader. R-B response: after the reader receives NT and from the tag, it then performs filtering operation. Other forms of authentication include the two-way handshake protocol, Ff-Family of protocols by Erik- Oliver et al. e. t. c. RFID distance bounding protocol proposed by Gerhard P. Hancke, and Markus G. Kuhn (Hancke and Kuhn, 2005) can be effective in the defense against relay attack. According Hancke and Kuhn (2005), relay attack introduces some delay in the transmission which conventional cryptographic measure employed in RFID system at the application layer due to much synchronization, and other mechanism for error-handling, anti-collision, e. t. c. cannot detect. They proposed a distance-bounding or secure-position protocol integrated into the physical layer of the communication protocol which can detect relay attack through high resolution 41 timing information on bit arrival. All the available authentication measures are logical leaving physical authentication vulnerable to attacks. 2.7.9 Anti-Counterfeiting Technology The unique identifier of RFID systems is susceptible to forgery/cloning attack. This attack can be mitigated via challenge response authentication protocol (Mitrokotsa et. al. , 2010). Engineering Researchers at the University of Arkansas developed an anti-counterfeiting method against RFID tag (Thompson, 2009). In their research, they discovered that each tag has a minimum power response at multiple frequencies, constituting its unique physical characteristics. M. Babaie, and H Rahimov (M. Babaie, 2010) proposed a chaos theory for detecting cloned tag. Juels (2005) demonstrated a resistive technique against cloning of RFID tags through challenge response authentication. 2.7.10 Physical-Layer Identification Technique The physical layer communication of the RFID system is the first layer of communication as depicted in Figure 2. 1 and it stands as the gateway for RFID technology as well as the first point of call for security defenses and privacy regulation. Brik et. al. , (2008) designed, implemented, and evaluated a technique called PARADIS, to identify the source network interface Card of an 802. 11 frame by analyzing the physical layer of the passive radio-frequency analysis. Radiometric identification (radio frequency fingerprinting) was the technique adopted by them for wireless device identification. Experimental result for physical identification by PARADIS was 99% accurate. Davide et al. (2010) also adopted 42 same principle in their experiment on RFID passive UHF tag identification but utilizes time domain features and spectral principal component analysis (PCA) for extraction and matching of the fingerprinting respectively. Using similar principle, (Danev et. al. , 2009) experimented on physical-layer identification of RFID passive tags but on HF tags. Results from their experiments showed that RFID cloning challenge can be solved. 2.7.11 Fingerprint Biometric Authentication On Smart Card The unique nature of human fingerprint in identification, have gained wide adoption in authentication procedure. Yahaya et al. , (2009) modeled a framework for such an authentication procedure, on a smart Card. In their framework, as depicted in Figure 2. 12, a fingerprint sensor was used in capturing the fingerprint. They reduced the captured image into minutiae points, after which, and it was stored as a template in the Card through a Card reader. The authenticating process involved a match-on-Card (MOC), through a system-on-Card (SOC). 43 Figure 2. 12 Authenntication and Identification Framework (Yahaaya et. al. , 2009) As shown in Figure F 2. 12, the fingerprint sensor serves as the input image for processing, extractionn and matching. Similarly, Chao Li, and Jin Qi (2010) proposed two-factor authenticaation system based on combined fingerpriint recognition and smart RF Card verrification. From their experiment, they cconcluded that the optimization does not n reduce the data precision, and also, “that fingerprint recognition algorithm m has good performance on hardware system. 2.7.12 Controllable Tag Marquardt et al. , (2010) proposed a tag which can be conntrolled by the user. In their experiment, various designs were sampled. In one saample, the tag was 44 equipped with indicaator (both acoustic and visual effect) to inddicate tag in-use of otherwise. In order to t control the activity of the tag, they integratted a switch system which can be manuaally activated. Additionally, they designedd tag that operates based on orientation,, daylight and darkness, and proximity depenndant. Example of their samples is show wn in Figure 2. 13. Figure 2. 13: Samplles of Controllable and Visible Tags. (Marquuardt et al. , 2010) With referencce to Figure 2. 13, four different types of coontrollable tags are shown. Portion labelled ‘1’ illustrates how a tag can be manuallyy controlled using a physically switch. In I addition, an indicator is attached to deteect when the tag is active. Label ‘2’ is siimilar to ‘1’ but utilizes a manual push buttonn for tag activation. Similarly, label ‘3’ uses u a pressure switch and an indicator. L Label ‘4’ utilizes a finger touch-sensitive contact metal surface for the activation of tag. In similar manner, Yum et al. , (2010) investigated the integration of a smart Card, and electrical switch to enhance e high level of security and privacy pprotection measure. Their design, paralleel plate conductors was used to decide the sstate of the switch, controlled with humaan finger. This propositiions, provides enhancment for privacy as weell as security in the RFID technology. The process of controlling stands as a reaal measure for the 45 enhacing the physical layer of the RFID technology. However, it does not satisfy the condtion in which a tag can authenticate a user on any bases. Eavesdropping Cloning Relay Physical-layer Privacy Clandestine × × × × RFID Zapper × × × Blocker tag × × × × × Clipper tag × × × × Labeling × × × × × × × × × Faraday cage × × × Kill command × Anti-counterfeiting × × × × Authentication × × × × × × × × × × × RFID virus Skimming RFID Guardian Attack tracking Mitigation Spoofing Authentication Denial Of Service Table 2. 2: Mitigation Against Attack on the Physical Layer protocols Physical-layer identification technique Biometric × × × × × × × × × × × × authentication Controllable tag From Table 2. 2, physical attacks such as unauthorized use of Card, unauthorized Card reading (attacks at the physical layer communication); seem to attract less of preventive/protective measure, while adversaries are exploiting these vulnerabilities. However in (Zanetti et. al. , 2010), these kinds of attack on physicallayer was extensively studied and solution, was proposed based on experimental 46 validation. While it provides considerably reasonable protection (accuracy of 99% from the experiment) for the unauthorized user attack, it does not provide protection against other forms of attack on the physical layer and it also raised more privacy concern by neglecting the fact, that the confidentiality of a compromised biometric system is considered flawed for further security application. If user’s privacy is a major challenge in the RFID technology, then, the proposition from Zanetti et. al. , (2010) may face more criticism. The Faraday cage in conjunction with labeling could be said to proffer solution for privacy concerns but in (Sitli et. al. , 2009), it was pointed out that the privacy protection for the RFID Card is only safe as long as the Card is within the cage. Similarly, the Faraday cage can be used by a malicious-user to cause a denial of service attack as well as being used as aiding equipment for RFID Card theft. 2.8 Physical Layer Security Due to the mobility nature and size of RFID tag and the reader, building or devising a security measure to effectively mitigate the rising challenges at the physical layer, have not received much attention from researchers. Few countermeasures as shown in Table 2. 3 have however been in use in a different perspective, which could be combined to mitigate most of these challenges. 47 Table 2. 3: Attacks and its Mitigation Targeted at the RFID Physical-Layer. × × × × × × × × × × × × × × × × × × × tracking Identification technique (Zanetti et. al. , 2010) Faraday Cage (Wu and Alamo, 2004) Authentication protocol (Shang-Ping, 2011) Clipped Tag (Moskowitz et. al. , 2007) Anti-counterfeiting technology (M. Babaie, 2010) Labeling ONLY create awareness for users Biometric × × × × × × × × × × authentication Yahaya et. al. ,(2009) Controllable Tag Marquardt et. al. , (2010) Authentication can be described as the process of verifying through identification, a subject and confirming the subjects’ claimed identity. Users-end countermeasure such as Faraday cage, blocking, and guarding of the tag does not provide authentication at the physical layer since it lacks the ability to identify the user. Identification layer Unauthorized Physical Spoofing × Clandestine Skimming killing of Tag Relay attack × Card use Tag cloning Physical-Layer Unauthorized Measure Card reading Proposed Counter- Unauthorized Authentication at Physical-Layer Vulnerabilities 48 From Table 2. 3, there is no preventive measure for unauthorized use of Card. At the system-end, the physical-layer identification by Zanetti et al. , (2010) provides authentication at the tag-reader end. They adopted the radiometry (identity of the tag referred to as tag fingerprint) system which is used to describe the unique identity of the tag. In addition, the authentication protocol proposed by Shang-Ping, (2010) provide authentication at the system-end. On the other-hand, clipped tag proposed by Moskowitz et. al. (2007), as a protective base upon which, skimming and spoofing attack can be combated but it does not provide measure against unauthorized removal of tag antenna, hence no authentication measure at physical layer. The Anti-counterfeiting technology proposed by M. Babaie, and H. Rahimov, (2010) provides mitigation base for preventing the exploitation of the vulnerabilities in the physical-layer but it does not provide measures against unauthorized of tag. Authentication at the physical layer can be achieved with the combination of the methodology of Zanetti et al. , (2010) and Moskowitz et al. , (2007). This combination can ensure extended security mitigation service such as mitigation against spoofing attack, skimming attack, clandestine tracking, unauthorized Card reading, and practically shield possibility of relay attack. It will also function as a firewall on the physical layer communication as well as ensure physical authentication at the tag end of the layer. 2.9 Summary Of Various Mitigation And Their Respective Drawbacks Concise details of the discussed existing mitigation measure as well as their advantages are shown in Table 2. 4. 49 Table 2. 4: Effectiveness of Mitigation to RFID Challenges. Proposed Mitigation Mitigation Advantage Applicability Drawbacks Low cost, Contactless Card, No Flexibility, E-passport, against Portability Portable- Eavesdropping, document No Against RFID Guardian (Melanie Privacy, Tracking R. Skimming, Rieback, 2005) Spoofing, Unauthorized reading protection Guarantee Faraday Cage (Joyce Tracking, H. Wu, 2004) protection Effective Impractical Skimming, (Haver, Unauthorized Contactless reading, Cards, Protection is only 2006), available within the cage. portable documents. Blocker Tag (Ari Tracking, Juels R. L., 2003, ) Effective Can cause a DOS Unauthorized attack, no reading, skimming protection guarantee Labeling Privacy Effective for All users RFID Creates awareness items/object sensitization and for malicious users also awareness Kill command Privacy, cloning Effective All RFID tags Prevents post POS tracking, service, can be skimming, used to cause a spoofing DOS service also. Clipped Tag (Paul Privacy, Effective, allows Retail outlets, No prevention for A. POS service Unauthorized use Moskowitz, skimming, 2007) tracking Anti-counterfeiting Cloning, technology Babaie, 2010) (M. Eavesdropping and clipping Effective All RFID tags No guarantee against unauthorized use, and privacy 50 Skimming, Authentication protocols and spoofing, Randomization tracking, viruses, (Shang-Ping, 2011), eavesdropping Physical –layer Skimming, identification (Boris spoofing, Effective, low Not applicable to No prevention for cost some types tags privacy, and cloning. Reader-end Contactless Card. identification No protection for privacy Danev, 2009) and eavesdropping RFID Zapper Skimming, (MiniMe, 2006) spoofing, privacy privacy issue Biometric Unauthorized authentication Card use, Effective for Retail outlets, For Effective for control user with (2009) authentication database Controllable Tag Unauthorized tag Effective Marquardt et. al. , reading, skimming, No POS service, concerns Yahaya et. al. , (2010) of Unauthorized use, especially access A compromised system fingerprint is no backend longer valid. Contactless Card, No authentication for retail items at physical layer, easy to destroy, privacy check privacy, Applicability as stated in Table 2. 4 refers to areas of application of the proposed existing mitigation measure. The Faraday cage is not practically applicable in the retail industry (Haver, 2006). Constructing a Faraday cage for a building, housing RFID system could suffer setbacks due to cost effectiveness. The clipped tag by operation, simply prevent unauthorized scan by limiting the read range of the tag. thus provide protection for user privacy as shown in Table 2. 4, and by extension, clandestine tracking. If such principle is coopted with physical barrier, it will counter other attacks such as skimming, unauthorized tag read and use (Zuo, 2010). 51 Similarly, the faraday shield proposed by Joyce H. Wu, (2004) protects against privacy, unauthorized reading of tag, and clandestine tracking but also failed to address issues such as cloning, relay, skimming and even unauthorized tag use. Langheinrich, (2009) hinted on the wide application of this measure (such as pouches and wallet lined with alluminium foil). Hover, (2006) explained that Faraday cage at best can only be a partial solution. Similar to the clipped tag, controllable tag proposed by Marquardt et. al. ,(2010) protects against unauthorized tag read and killing, privacy, and consequently, skimming and clandestine tracking. But however failed in protecting against cloning, spoofing and unauthorized tag use. similar control is applied in mobile phones (Juels, 2006). In addition, RFID guardian proposed by Reiback, (2005) protects as well as unauthorized reading of tag, skimming, and clandestine tracking. The fact that is it a separate battery powered device raised questions such as; how does it “acquire and release control and their associated PINs or keys” (Juels, 2006 ), what if the device is stolen, forgotten or even tampered with (Hover, 2006). Additionally, it failed to protect the tag against cloning and unauthorized use. Hover, (2006) therefore conclude that it will function more effectively if integrated into with other measures. Furthermore, blocker tag proposed by Juels,(2003) provide protection against privacy, unauthorized reading and killing of tag, skimmin and clandestine tracking. It however does not protect against cloning, spoofing, unauthorized use of tag, and relay attacks. While, it is cheap to manufacture, its operation is a funtion of its orientation, hence a misalignment could prevent it from operation and by extension, exposes the blocked tag (Langheinrich, 2009). Moreover, one major challenging question which has remained unanswered in the above stated measur is their inability to define ‘who is an authentic’ and what ‘authentication’ is authentic. 52 Physical-layer identification by Zanneti, (2010) as shown in Table 2. 4, was developed to protect agianst cloning or counterfeiting attacks and by extension, relay and spoofing attack. This is similar to the “digital signing model by Texas instrument and VeriSign Inc. ” (Juels, 2006 ). It does not provide protection against privacy, clandestine tracking, and unauthorized use of tag. Anti-counterfeiting technology proposed by Babaie, (2010), Tuyls and Batina (2006) also provides protection against cloning, relay and skimming attacks but failed to provide protection for privacy, unauthorized reading, use and killing of tag. It also does not prevernt against copying of tag data (Jeng et. al. , 2009). Similarly, Jeng et. al. , (2009) concured to the condition of the physically unclonable function certificate-Identity-based identification (PUF-cert-IBI) by Tulys and Batina, (2006) but expressed concern for improvement against excessive use of resources. Moreover while this protocol address issues “ between the tag and reader radio frequency communication in the air”, it failed to solve security related issues on tag memory duplication (Jeng et. al. , 2009) . Authentication protocol by Shang-Ping, (2011) addressed tag- reader and reader-tag skimming attack but failed to protect side channel attacks such as relay attack, timing attack and eavesdropping on communication. It can however function effectively against these attacks if combined with other physical-protective, and anticounterfeiting measure. This is still hindered by the low computational power of RFID tag (Langheinrich, 2009). The authentication system by Yahaya et al. , (2009) using fingerprint biometric on smart Card as shown in Table 2. 4, provides authentication for user at the Card-Reader end. However, it does so by Reader to Card authentication, which does not totally depend on the intelligence of the Card. Biometric system can be integrated with other forms of measure to ensure security of the RFID system (Govindan et. al. , 2009 ). In view of the above and the analysis shown in Table 2. 4, it can be said that various proposed mitigation measure have not taken into consideration the 53 vulnerabilities posed by user-end authentication at the physical-layer of the RFID technology. Consequentially, unauthorized use of tag has led to practical security and privacy breach in the RFID system. Hence, this study aims to provide protection against unauthorized use of RFID Card. More so, it will also ensure privacy protection, prevent unauthorized reading of tag. Practically, it can be considered as a ‘fire-wall’ for the physical-layer of the RFID technology. 2.10 Other Types of Mitigation Used For Physical Authentication Physical authentication in information security broods over the old axiom of “something you have, something you know, or something you are” (Crosbie, 2005). For authentication diagnosis, a security system should incorporate at least two (Haines, 2010). RFID Card falls within the category of “something you have”. While secret codes such as passwords fall within the category of “something you know”, biometrics on the other hand, falls within the category of “something you are”. There are various types of biometrics, but a few will be discussed in this section. 2.10.1 Iris Pattern Recognition Iris recognition was developed by John Daugman and it is considered as the most accurate of all biometric authentication process (Prashanth et. al, 2009). The visible portion of the human eyes consists of pupils, iris, lens, cornea and sclera. The iris is located between the sclera and the pupil. The texture of the iris is unique but complex (Crosbie, 2005). Its pattern comprises of unique features; arching ligament, 54 furrows, ridges, crypt, rings, corona, freckles and a zigzag collarette (Prashanth et. al, 2009) Its pattern recognition/capturing are based on video camera technology, similar to cam-coder. Using a proximity activator sensor, a subjects positioned at an iris scanner unit can enroll, verify and authenticate their identity (Crosbie, 2005). This identity can then be used as a token for authentication. 2.10.2 Body Odor Authentication The human body constantly emits a unique volatile organic compound (VOC), irrespective of the diet, and environmental presence (Gibbs, 2010) which can be used to authenticate users. Certain body odor result such as recent activity, and disease, for instance, can be used in event critical authentication (Gibbs, 2010). 2.10.3 Facial Recognition Facial recognition is done by capturing the image of the human face in a visible camera or infrared pattern of facial heat emission using wide assortment of cameras (Vecca, 2007). Facial recognition is based on location and shapes of facial attributes, such as the eyes, eyebrows, nose, lips and chin (Anil Jain,2000). 55 2.10.4 Fingerprint Pattern The human finger possesses unique sets of series of ridges and furrows on the surface of the finger, which is determined during the fetal period (Scheidat et. al, 2006). Fingerprint pattern can be acquired through scanning of the finger. Fingerprint scanning is the acquisition and recognition of the characteristics of the fingerprint (Lee,and Bhattacharjee 2009). 2.10.5 Signature Pattern Human hand writing pattern can be unique depending on the level of consistency. Signature pattern verification is the process used to recognized individual handwriting (Anil Jain, 2000). The major feature for verification includes speed, pressure, timing, shape, size, length, look and depth of the signature. They are further classified into dynamic and static signature verification process (Anil Jain, 2000). 2.10.6 Hand Geometry Hand geometry uses measurement of the hand including its shape, length, overall bone structures, distance between the fingers curve, finger thickness, and width of the finger (Vecca, 2007). Authentication method could span through the five fingers and particularly, the thumb and the index (Anil Jain, 2000). 56 2.10.7 Retina Pattern These are patterns formed by the veins beneath the retina surface of the human eyes. The scanning process involves placing the eyes to an intense illumination (Vecca, 2007). This process, involves the capture, and analyses of blood vessels on the nerves of the back of the eyeball through the penetration of light to the pupil. For efficient result, a subject is required to stand at a predefined position within visual field (Anil Jain, 2000). 2.10.8 Speech Pattern/ Voiceprint The psychological and behavioral features of the human voice make them unique (Anil Jain, 2000). The shape of the human tract is responsible for the uniqueness in voice pattern. Voice recognition analyzes the pitch period, rhythm, tone, spectral magnitude, frequency, and bandwidth (Vecca, 2007). Template of voice analyses are referred to as voiceprint and can be verified using a particular word, phrase, and or group of phrases (Saquib et. al, 2011). 2.11 Integrating Various Physical Authentication Mitigation on RFID Card Although there are various physical authentication mitigation as discussed in section 2. 10, however, not all of this authentication system can be integrated into each other particularly the RFID Card. Table 2. 5 gives a detail analysis on the various authentication mitigations. 57 Table 2. 5: Comparison of Various Authentication Mitigations Based on Integrative Prop erty with RFID Card (Anil Jain L. H. , 2000), (Vecca, 2007), Authentication Circumvention applicability Ease of use Voiceprint High Not feasible High Hand geometry Low Not feasible High Signature Medium Applicable but Medium Mitigation time demanding Iris Low Not feasible Medium Fingerprint Medium Applicable High Body odor Medium Not feasible High Retina Low Not feasible Low Face Medium Not feasible Medium From Table 2. 5, signature authentication and fingerprint are both applicable for integration into RFID Card. However, the signature authentication is rated medium in term of ease of use. In practice, the signature authentication system introduces a delay, and inconveniency, as it will require the authenticator to always carry along a writing material each time access is required. Fingerprint on the other hand, is rated applicable and also, high eases of use. Practically, the fingerprint scanning process introduces mobility for the authenticator. 58 2.12 Summary In this chapter, the underlying theory of RFID technology, application area, known security and privacy concerns were presented. Various proposed mitigations against these challenges were also presented alongside their limitations. Authentication at the physical layer of RFID technology was further discussed with focus on the existing mitigation mechanism. 59 CHAPTER 3 METHODOLOGY 3.1 Introduction This chapter introduces and discussed the methodology that will be used to achieve the research objective of this study. The organization of this chapter is as follows: the operational framework of the study; literature review; study of three mitigation measures; project methodology; summary. In the project methodology, three mitigation measures were combined. The project methodology was broken down into three phases. Each phase is discussed in detail. 60 3.2 Operational Framework This section covers the systematic process involved in this study. With reference to Figure 3. 1, the operational framework is divided into three phases. Start PHASE 1: Study of existing mitigation Review Study of the clipped tag method Study of the Faraday shield method Study of the fingerprint biometric authentication method PHASE 2: Analysis of selected measure Project Methodology Propose an enhanced authentication measure by combining previous methods Implementation of proposed method PHASE 3: Proposed mitigation measure End Figure 3. 1: Operational Framework Phase 1 and phase 2 of the operational framework shown in Figure 3. 1 are discussed in detail in the proceeding sections. However, phase 3 is discussed in brief in this chapter but the detail discussion is in the proceeding chapter. 61 3.3 Review of Existing Mitigation Researchers have devised various mitigations against the myriad fold of challenges and emerging threats to RFID system. In a way to address privacy concerns in the RFID system, Juels et al. , (2003) proposed blocker tag, a tag capable of overloading the anti-collision protocol of the reader. Blocker tag also protect against skimming attack, unauthorized tag killing as well as unauthorized tag reading. Wu and Alamo, (2004) proposed an electromagnetic shield called Faraday cage which is can be used to shield electromagnetic wave. This cage protects Card against unauthorized reading by creating a firewall over the communication link. Similarly, it also protects against skimming, and relay attack. Reiback et al. , (2005) proposed portable device called RFID guardian which is a capable of selective frequency jamming. Thus, the device can protect against unauthorized reading, skimming attack, as well as ensuring privacy. Furthermore, Moskowitz et al. , (2007) proposed a physical clipped tag using perforated tear-off antennas. In similar plight, the use of two tags was proposed by Inoue and Yasuura, (2009); one tag holds the unique serial number which will be peeled off. This measure protects against long range unauthorized Card reading, and ensures privacy. Hancke and Kuhn, (2005) proposed distance bounding protocol for protecting against relay attacks. In addition, Davide et al. , (2010) among other researchers, proposed an identification technique capable of mitigating cloning and spoofing attack. , Yahaya et al. , (2009) proposed fingerprint biometric authentication system between the Card and the reader on which the fingerprint was stored on the tag. They presented a modeled framework on smart Card against unauthorized Card use. Marquardt et al. , (2010) proposed varieties of controllable Cards. This protect against skimming attack, unauthorized tag reading consequential to clandestine 62 tracking, as well as ensuring privacy. More-so, Shang-Ping, (2011) among many other propositions, proposed an authentication protocol to protect against skimming attack. In order to protect against unauthorized use of Card at the tag-end, measures such as fingerprint biometric authentication proposed by Yahaya et al. , (2009) can integrated into the physical clipped tag proposed by Moskowitz et. al. , (2007). The read range limitation in the clipped tag can be prevented with the use of a shield around the clip. 3.3.1 Physical Clipped Tag It was originally suggested by “IBM as an additional consumer privacy mechanism” as a way to guarantee user’s control over the tag through transformation of long-range transponder to reduced proximity transponder. Moskowitz et al. , (2007) concluded that a more efficient and simplistic technology for enhancing privacy is the use of a clipped tag. Figure 3. 1 shows the schematics of the clipped tag. A Figure 3. 2: B A) Schematics of clipped tag B) Garment hang tag. 63 The perforation notch shown in the schematics of Figure 3. 2 a) and the tear line in Figure 3. 2 b) indicates point of tear initiation. Once the notch is remove (which is actually a segment of the antenna), the transmission ability of the tag is transformed. Figure 3. 3 illustrates the possibility of implementing this technique. Clipping the tag therefore incapacitate mutual coupling of tag antenna. However, the tag can still be read within a closed proximity. B A Figure 3. 3: Clipping an Antenna The figure labeled ‘A’ in Figure 3. 3, illustrates an unclipped tag while figure ‘B’ illustrates a tag that has been clipped through the detachment of scratch-off material. This method provides a more enhance privacy technology in the RFID system. 3.3.2 Faraday Cage. Wu and Alamo, (2004) concluded the RFID system can be protected using the faraday shield. Michael Faraday (1836) observed that charges that reside on the surface of a conductor do not have influence on the interior or anything enclosed within the conductor. It was further explained by Gauss, who stated that 64 “the electric flux (݊E) through a closed surface S, is equal to the amount of charge enclosed. Equation 3. 1 gives the mathematical expression of Gauss law. …equation 3. 1 ‘݊E’ is the electric flux, ‘S’ is a closed surface ‘ ’ is the electric field, ‘ ’ is a surface element, ‘q’ is the sum of all the charges that lie inside the closed surface S. Thus, a faraday cage is referred to an enclosure or system capable of preventing the inflow or outflow of electromagnetic wave. Figure 3. 4 illustrates the operation process of the faraday cage. A B Figure 3. 4: Operational Process of Faraday Cage. (Rubin, 2011) In Figure 3. 4, Figure ‘A’ represents an externally created electric field with polarity from positive to negative. Applying ‘A’ to the surface of the conductor causes a rearrangement (as depicted in ‘B’) of the electrical charges inside the cage which is in opposite direction (and same magnitude) to the original field. Figure 3. 4 ‘A’ can be referred to as the interrogatory wave from the reader, while ‘B’ represents the counter effect experienced by the wave due to the cage effect. Adopting this measure in RFID system provides flexible control for user over the communication process at the tag-end 65 3.3.3 Fingerprint Biometric Authentication Fingerprint comprises series of ridges and furrows on the surface of the finger. The pattern of the ridges and furrows determines the uniqueness of the print. Minutiae are also one of the principal compositions of the fingerprint. “Minutiae points are local ridges characteristics that occur either at a ridge bifurcation or ridge ending”. Figure 3. 5 shows different examples of minutiae (dark lines are the ridges while the white are furrows). 2 1 6 5 4 3 7 8 9 10 11 12 13 14 15 16 Figure 3. 5: Examples of Minutiae Types As shown in Figure 3. 5, the dark lines and white lines on the fingerprint can form unique shapes which are distinguishable by the use of a fingerprint device. 1) Beginning Or Ending 2) Single Bifurcation 3) Double Bifurcation 66 4) Triple Bifurcation type 1 5)-Triple Bifurcation type 2 6)-Triple Bifurcation type 3 7) Hook 8)-Single Whorl 9)- Double Whorl 10) Single Bridge 11)-Twin Bridge 12) Interval 13) Point 14)-Through Line 15)-Crossing 16) Side Contact Fingerprint could be classified into: x An inked fingerprint; obtaining fingerprint images from an impression of finger surface on intermediate medium such as cloth and paper. x A latent fingerprint; prints obtained from fingerprint contact surface, after the oozing out of sweat, moisture and or grease from other part of the body on the surface of the finger. x Live-scan fingerprint; obtaining fingerprint through the impression of the finger surface on device (also referred to as scanner) without rolling. Inked and latent fingerprint are beyond the scope of this study, hence will not be discussed further. There are different types of scanner for acquiring live-scan, but only two will be mentioned in this study; optical frustrated total internal reflection (OFTIR), and sensing of differential capacitance. The OFTIR consist of a surface glass prism, a charge coupled device (CCD) camera and a light source as depicted in Figure 3. 6. Figure 3. 6: a)Example of an OFTIR b) Image Geometry 67 As shown in Figure 3. 6 a), a finger is placed on the scanner (on a glass prism), the ridges make contact with the prismwhile the valleys does not. The laser light illuminates the glass at a certain angle as shown in Figure 3. 6 b), and but scattered due to the ridge contact on the surface. “The incident light corresponding to valleys experinces total internal reflection. The CCD camera then captures the reflected light from the glass resulting in a corresponding fingerprint image” (Anil Jain, 2001). Sample of a live- scan fingerprint is shown in Figure 3. 7. Figure 3. 7: Example of a Live-Scan Fingerprint. The acquired image Figure 3. 7 for instance is further processed through minutiae extraction as illustrated in Figure 3. 8. Figure 3. 8: Typical Algorithm for Minutiae Extraction 68 As shown from Figure 3. 8, the orientations of the local ridges are estimated from the input image from selected regions of interest. It is further redefined to remove (to the bearest minimum), small speckles and holes. “It s then thinned to obtain eight connected single-pixel-wide ridges” (Anil Jain, 2001), after which, minutiae points are heuristically obtained. Usually, the ridges pixels with three-ridge pixel neighbors are classified as ridge bifurcation while those with one-ride pixel neighbor are ridge ending. 3.4. Project Methodology With reference to Table 2. 9, we can conclude that the existing mitigation methods for combating security and privacy issues at the physical-layer of the RFID system particularly at the tag-end have not provided any solution towards authenticating user. A malicious user with the Card can therefore gain access to a confidential object, or even clone the tag. Consequently, a possible mitigation to user’s authentication at the tag-end of an RFID system will be proposed. As a part of the proposed method, Figure 3. 9 gives the flow chat of the project methodology of this study. 69 Stage 1: Design and Fabrication of antenna Tag Design of a controllable Faraday shield Identification and fabrication of clippable tag Stage 2: Fingerprint acquisition and matching Fingerprint Module Features extraction processing and template formation Acquiring Fingerprint and process image Fingerprint matching process Stage 3: Code development and Testing Develop a system control algorithm Validation Figure 3. 9: Flow Chart of Project Methodology As shown in Figure 3. 9, this project methodology comprises three stages. Each of the three stages is discussed in the proceeding sections. 70 3.4.1. Stage 1: Design and Fabrication of Tag This stage comprises two phases; to identify and fabricate a clippable tag, and to construct a controllable Faraday shield around the clipped tag. In this stage, clip tag will be used to design the controllable tag. The notch of the clip tag will be designed such that it can be controlled using digital logics. As discussed in section 3. 3. 1 of this chapter, a clipped tag still responds to interrogation within its proximity. Consequentially, a controllable shield will be designed around the tag. This stage proposes a totally user controllable tag. 3.4.2. Stage 2: Fingerprint Acquisition and Matching This stage involves two phases. The first is the process of acquiring and extracting key features of fingerprint, while the second is process of matching the fingerprint. For this task, the system on Card (SOC) method proposed by Yahaya et al. , (2009) as illustrated in Figure 2. 11, will be applied taking into consideration a 1:1 matching process and encryption of template before matching. 3.4.3. Stage 3: Code Development and Testing This stage involves the development of a fingerprint authentication code and its respective circuitry that will control the system under study. Detail of this stage is discussed in the proceeding chapters. 71 3.5.Summary. In this chapter, the operational framework of this study was discussed. It embodies three phases. Two of the phases were discussed in detail while the third one was briefly discussed. Brief explanation of the project methodology was given while the details will be covered in the proceeding chapters. 72 CHAPTER 4 DESIGN OF BIO-THENTIC RFID CARD 4.1 Introduction This chapter entails discussion on existing measures to security and privacy challenges in the physical-layer of RFID technology as well as the proposition of the enhancement method. In view of that, phase 3 of the operational framework in chapter 3 is also discussed in this chapter. The design processes of the prototype of this proposed enhancement method is also discussed in detail. Additionally, the detailed analysis of the design procedure of this study is also presented. The design process procedure was segmented into the antenna design unit, the biometric authentication unit, and the control unit. A concise summary of the procedures is given at the end of the chapter 73 4.2 Existing Mitigation Measure Analysis Various existing measure on security and privacy challenges in RFID system were studied. Summary of the analysis of the measures is given in Table 4. 1. Reference was channeled towards attacks on the physical-layer and its respective proposed mitigation. Skimming Spoofing Clandestine Relay Privacy Ö × Ö × Ö Faraday Cage (Joyce H. Wu, × × × Ö Ö Ö × × Ö Ö Ö Ö Ö Ö Ö Ö Ö × × × × × × identification × × × × × × Ö × Ö Ö Ö Ö Ö × Clipped Tag killing Unauthorized (Paul tracking Cloning Ö Mitigation reading A. Ö Attacks Unauthorized Unauthorized use Table 4. 1: RFID Physical-Layer Attack-Mitigation Analysis Moskowitz, 2007) 2004) Controllable Tag (Marquardt et. al. ,2010) Biometric authentication (Yahaya et. al. ,2009) Anti-counterfeiting technology (Babaie, 2010) Physical-layer technique (Davide Zanetti, 2010) Authentication protocol Ö (Shang-Ping, 2011) Labeling Creates user awareness RFID Guardian Ö × × Ö Ö 74 (Melanie R. Rieback, 2005) RFID Blocker Tag ( Juels et. × × × Ö Ö al. , 2003) indicated that the mitigation measure is applied to such threat × indicates that the measure does not apply to that threat Ö indicates the measure can be combined with other measures As shown in Table 4. 1, there is only one mitigation measure against unauthorized use of Card attack. In addition, controllable and clipped tag measure can be enhanced to combat this type of attack. Labeling of tag does not protect against security but enhances privacy through alerting user of the presence of RFID tag. 4.3 Proposed Mitigation With reference to the discussion in the preceding section of this chapter, Figure 4.1 gives an overview of the various proposed mitigation against security and privacy challenges in the RFID technology specifically, with reference to the physical-layer. RFID SYSTEM 75 STRATEGIC LAYER APPLICATION COMMUNICATION PHYSICAL Labeling Kill command Anti counterfeiting technology Clipped tag Blocker tag Fingerprint Biometric authentication Physical layer identification RFID Guardian Faraday cage RFID zapper Controllable tag SECURITY AND PRIVACY EXISTING MITIGATION Mitigation Fingerprint Biometric authentication Faraday Cage Proposed Mitigation Clipped tag Limitations Figure 4.1: Overview of Proposed Mitigation As shown in Figure 4.1, the proposed mitigation of this study is the hybrid of three existing mitigations; physical clip tag, Faraday cage and fingerprint biometric authentication system. Worthy to note is that, this measure focuses on the Card security and privacy; hence, the biometric data is not used during communication but initiates the Card for communication. This is to prevent the possibilities of compromising the fingerprint either in communication, application or strategic layer. The architectural composition of the proposed mitigation for this study is shown in Figure 4. 2. 76 Determine the number of turns, dimension and positioning of the coil, Not suitable for a 13. 56MHz Study of antenna design system No Determine the antenna orientation and the height of the dielectric substrate Simulation (using CST software) Design clip joint and simulate Yes Design a digital controllable Faraday Yes No Yes Fabrication and real time verification Unit Sensor Acquire the fingerprint Feature extraction unit Template No match Match CONTROL UNIT Matching unit Figure 4.2: Implementation Flow Chat As shown in Figure 4. 2, the implementation process will involves three basic steps. The first step involves the process of simulating the tag using computer simulation software (CST). The second step covers the process of acquiring, processing and matching of the fingerprint. The final stage involves the fabrication 77 and real time validation unit, and the control unit. Figure 4. 3 shows a concise depiction of the proposed mitigation as well as indicating the communication channel. Control module Fingerprint module Input Fingerprint match unit Communication line-2 Controller Communication line-3 Communication line-1 RFID Tag Clipped tag and digitally controlled Faraday shield Figure 4. 3: Communication Process of the Proposed Mitigation The communication lines 1, 2 and 3 are the channels of interaction between the different modules as shown in the Figure 4. 3. Communication line-1 is the input command line from the controller to the fingerprint module. fingerprint module on when to accept ‘Input’. It instructs the The communication principle involved in this communication line is polling command. The controller unit continuously polls the fingerprint module for input fingerprint. Communication line-2 is the reply-to-request of polling command. It sends the result of any scanned input fingerprint as feedback, which is further used to dictate the communication line-3. The communication line-3 is the command line 78 for the digitalization of the Faraday shield, and consequently, Card activation/deactivation. The detail of these processes is discussed in proceeding section. 4.4 Antenna Design The antenna design was patterned after a previously implemented loop antenna for smart cards with small dimension, and effective structure (Jussi Nummela et. al. , 2007). 4.4.1 Antenna coil In order to design the coil, a computer simulation technology (CST) microwave studio 2010, software was adopted. The designed antenna has a regular loop structure consisting of stripped copper lines. The loop has external dimension of 54x33mm, copper line loop of width 0. 5mm, and 7 turns of coil with spacing of 1mm, and 0. 035mm thickness as shown in Figure 4. 4 79 Figure 4. 4: Snapshot of CST 2010 Antenna Design. The simulation result shown in Fig. 4. 4 does not exhibit a pure inductive property. This is verified from the s-parameter (signal to noise ratio in dB) graph generated by the simulation as shown in Figure 4. 4. The result was however good enough for the purpose of this study, and in line with the scope of this study. The printed circuit board (PCB) is made of FR4-lossy dielectric material, with thickness of 1. 6mm, and dimension of 60x40mm, relative permeability of 1, and a relative electric permittivity of 4. 55 as shown in Figure 4. 5. 80 Figure 4. 5: FR4 Lossy Material The design of the FR4-lossy was in line with the dimension of the desired antenna board as shown in Figure 4. 5. magnitude of the antenna in dbi. Figure 4. 6 shows the S-parameter 81 Figure 4.6: S-parameter of the designed antenna The simulation result shown in Figure 4.6 proves that a 54x33mm loop coil with 7 turns at 0.035mm coil spacing, can be used to design a 13.555MHz RFID Card antenna; with S1,1 value of -2. 730712dBi at 50ohms impedance matching, in open air boundary conditions in the X-axis, Y-axis and Z-axis respectively. 82 4.4.2 Clipped jointt The clipped jooint was introduced as the gap between both ends of the antenna coil as shown in Figgure 4. 7. During the simulation, transient solver of the CST software was used to adopt. Transient solver analysis. Figure 4. 7: Snapshot showing the clipped jjoint The two ends of the antenna coil serves as the joint betweeen the tag circuitry and the clip as shownn in Figure 4. 7. Figure 4. 8 shows the fabrricated Card; where ‘A’ shows the fabriccated unit with the clip joint unconnected, w while the ‘B’ shows the connected clip joiint. 83 As shown in the Figure 4. 8-‘B’, the clip joint was designed to respond to electrical pulse. The electrical conductivity (control signal) was introduced using a printed circuit board (PCB) miniature relay of 1A, 5V d. c, and internal coil resistance of 166ohms. A B Tag Miniature Relay Connected to control unit Figure 4. 8: Fabricated Antenna Unit The coupled miniature relay as shown in Figure 4. 8 ‘B’ creates a form of closed loop of electrical system. This closed-loop created, functions in a way to counter any electrical signal from the outer surrounding. This process is referred to as a Faraday shield. As a result of this shield, interrogation of the tag is not feasible. 4.4.3 Biometric authentication SN-FPR-UART authentication process. fingerprint reader was adopted for the biometric Figure 4. 9 shows the block diagram of the hardware composition of the module. 84 Figure 4. 9: Block diagram of the fingerprint module (Cytron T, 2011) As shown in the Figure 4. 7, the fingerprint module functions communicate directly to peripherals. The data format for the communication is 8-bits data bit, 1bit stop bit, and no parity bit at a baud rate of either 19200BPS. Additionally, it also uses an optical fingerprint scanning process. 4.4.4 Fingerprint Module Security Mechanism SN-FPR-UART fingerprint reader has an accuracy of 0. 0001% of false acceptance rate (FAR) and 0. 01% of false acceptance rate (FAR), with an enrolling time of 1s per time and matching time of 1s. It supports both 1:1 and 1: N fingerprint verification system. extracted and stored. Only Eigen value of fingerprint template are 85 4.4.5 Fingerprint Storage and Matching The storage process of the Eigen value of fingerprint template involves a three consecutive enrolment using the enrolment command in Table 4. 2. Table 4. 2: instruction command for fingerprint storage First Byte 1 3 4 5 6 7 8 0XF5 0x01 ID-LB ID-HB SEC-LEVEL 0X00 CHK 0XF5 Reply 0XF5 0x01 0X00 0X00 SEC-LEVEL 0X00 CHK 0XF5 Byte 1 3 4 5 6 7 8 0XF5 0x02 ID-LB ID-HB SEC-LEVEL 0X00 CHK 0XF5 Reply 0XF5 0x02 0X00 0X00 SEC-LEVEL 0X00 CHK 0XF5 Byte 1 3 4 5 6 7 8 0XF5 0x03 ID-LB ID-HB SEC-LEVEL 0X00 CHK 0XF5 0XF5 0x03 0X00 0X00 SEC-LEVEL 0X00 CHK 0XF5 enrolment Cmd Second enrolment Cmd Third enrolment Cmd Reply 2 2 2 As shown in Table 4. 2, the storage process requires the enrolment of the fingerprint three times using different commands. The byte-7 is the check sum byte used for detecting errors in the frames/command. ID-LB, ID-HB and SEC-LEVEL represents the low byte of the storage number, high byte of the storage number, and security level respectively. The matching process is a stream of 8-bytes of data as shown in Table 4. 3. Table 4. 3: Instruction format for fingerprint Matching Byte 1 2 3 4 5 6 7 8 Cmd 0XF5 0x0C 0x00 0x00 SEC-LEVEL 0X00 CHK 0XF5 Reply 0XF5 0x0C ID-LB ID-HB SEC-LEVEL 0X00 CHK 0XF5 86 Table 4.3shows the matching process for a 1:N matching. For a 1 ratio 1 matching, the second byte (0X0C) in Table 4. 3 will be replaced with 0X0B. 4.5 Control Unit The control unit constitutes basically of a single computer on-chip microcontroller. AVR- Atmega-8515 microcontroller was adopted. The communication process between the fingerprint module and the antenna coil (RFID cabinet) is linked using the universal synchronous asynchronous receiver and transmitter (USART) unit of the microcontroller. 4.5.1 AVR Atmega-8515 Microcontroller The Atmega-8515 microcontroller is a 40-pin PDIP low power 8-bits microcontroller with advance reduced instruction set computing (RISC) architecture comprising a 32x8 general purpose working register, a data throughput at 16MHz and a programmable serial USART. Figure 4. 10 shows the block diagram of the Atmega-8515 microcontroller. 87 Figure 4. 4 10: Architecture of Atmega-8515 Microconntroller The Atmega-8515 microcontroller has four programmablle input and output ports, which are connnected to the controller structure through a poort driver/buffer and a port digital interfacce as shown in Figure 4. 10. Port D is interffaced directly to the USART unit, which is linked through an 8-bits data bus to the aarithmetic and logic unit (ALU) via the status s register. Figure 4. 11 shows the pin-oout of the Atmega8515 microcontroller chip. 88 Figure 4. 11: Pin-Out of Atmega-8515 Microcontroller. The USART unit interface directly with the RXD (pin 14/PD0) and TXD (pin 15/PD1) pin of the microcontroller as shown in Figure 4. 11. Ports A, B, C and D are each 8-pin input and output interfaces. 4.5.2 Control Circuitry The control circuitry comprises a programmed microcontroller (using assembly language), and a miniature relay. Figure 4. 12 shows the design of the circuitry. Refer to appendix A for the communication code. Four different fingerprint templates were stored in the fingerprint module library. Each of the templates, labeled A, B, C, D, were assigned expected output as shown in Table 4. 4 and the corresponding responding output was used to either control the triggering of the miniature PCB relay (A & B), power-on a green , yellow, or blue LED. Any other fingerprint that does not match with the stored fingerprint library is classified as a malicious user, and hence assigned with the template label ‘E’. The 89 microcontroller continuously polls the fingerprint for any input. Refer to Appendix B for the flow chart of the process. If there is any finger placed on the scanner, the fingerprint module extracts the Eigen value, and then compares it with the already stored template. If there is match, a corresponding output is triggered, and otherwise, a red LED indicates an unknown user. In order to trigger the RFID Card, two separate fingerprints of the authenticator was sampled. The controller ensures that the two fingerprints must be matched before triggering the Card. The triggered Card remains active for duration of 2. 46ms and 2seconds (since the RFID HF tag operates within the range of 13. 56MHz) Figure 4. 12: Schematics of Control Process As shown in Figure 4. 12, the circuitry was designed such that a dual contact process (PD3 and PD4 pins) are required for tag activation through the miniature relay contactor mechanism. The relay (normally open-NO-) is programmed to 90 energize (operation period), for a period. When the time of contact is lapsed, the relay is de-energized to its normal state (idle state). An authentic fingerprint initiates the operation state. The fingerprint input is connected via the USART port (RXD and TXD) pin of the Atmega8515. The LED indicators are connected to the PD7, PD6, PD5 and PD4 pins of the microcontroller as shown in Figure 4. 12. Table 4. 4 shows the analysis of the connection and the desired output. Table 4. 4: Control Output Indication Template Atmega-8515 Control label Pin-out Effect A and B PORTB, 6:4 Miniature relay Authorized PORTD 7 And Green-LED permission, access granted PORTD, 6 Yellow-LED Authorized C Indication user user with without access access permission, access denied D PORTD, 5 Blue-LED Unauthorized user, access denied E PORTD, 4 Red-LED Unauthorized user, access denied (and further warning may be indicated As shown in Table 4. 4, the combination of template labeled ‘A & B’ is the expected authorized and full access permission user. ‘C’ is an authorized user but does not have access to the object under investigation (in this case the Card-Reader interrogation). ‘D’ on the other hand, represents unauthorized. Label ‘E’ is classified as a malicious user. This could attract other forms of warning, but for the sake of this project, it is tagged with e Red LED indicator. 91 4.6 Summary This chapter entails the detail procedure for the implementation of the design of the prototype of the Bio-Thentic Card. It also presented the various functionalities involved in the design procedures as well as the hardware and software involved. 92 CHAPTER 5 RESULT AND ANALYSIS 5.1 Introduction This chapter presents the results of the designed and fabricated proposed methodology; to enhance the authentication of the RFID Card. In addition, it also illustrates how various known attacks on the RFID Card can be prevented, and hence combated. The first section detailed the result of the design and fabricated output, while subsequent sections described the diverse processes of exploiting the inherent vulnerabilities in the RFID Card. A concise summary of the detailed result is given at the last section. 93 5.2 Bio-Thentic Card Prototype testing After the design of the Bio-Thentic Card, it was subjected to various range and authentication test. Figure 5.1 shows the Bio-Thentic Card prototype. FINGERPRINT MODULE Communication link to the controller Front View Back view Figure 5.1: Bio-Thentic Card Prototype. For testing purpose, the card was uncased/un-laminated as shown in Figure 5.1. The front view shows the connection between the fingerprint module, communication link to the controller, and the Card, while the back shows the connection between the fingerprint module and the controller. Figure 5.2 shows the testing procedure for the authentic cardholder. This is predicated upon the fact that the fingerprint templates of the authentic cardholder have been stored in the fingerprint module. 94 STEPS INDICATOR Power ON the control module Place the LEFT-INDEX finger on the fingerprint Module, for one second. Place the LEFT-THUMB finger on the fingerprint Module, for one second. Place the Bio-Thentic Card closer to the RFID Reader The Bio-Thentic Card responds to interrogation One time Beep sound, Blue light on the fingerprint module, Power-ON LED activated One time Beep Sound, Blinking blue light on the fingerprint module One time Beep sound, once blink of the blue light on the fingerprint module, green LED df The Card is activated for duration, based on the level of user’s responsiveness, 3-seconds in this case. Figure 5.2: Testing Procedure for Authentic User As shown in Figure 5.2, the communication process is initiated after the following procedures are certified. 1. The control unit of the card in powered ON. This is done by connecting a 5V power supply to the control unit. 2. The authentic Cardholder then places his left-index (the left-thumb finger can also be the placed first) finger on the fingerprint module for one seconds. 3. Afterwards, the authentic cardholder then places his left-thumb (the leftindex finger can also be placed as the second input finger) finger on the fingerprint module for one seconds. 4. The Card is then placed closer to the RFID reader, for interrogation. 95 Figure 5.3 shows the generic procedure for testing both authentic and unauthentic cardholder. This test is predicated on the fact that the fingerprint template of the cardholder is stored in the fingerprint module, as well as two three other fingerprint template representing various level of un-authentic cardholder. POWER-ON THE CONTROL UNIT Place the left-index finger on the fingerprint module Place other finger on the fingerprint module Place the card closer to the RFID reader Place the left-thumb finger on the fingerprint module No interrogation responds from the RFID reader, and a corresponding level of authority is activated. Place the card closer to the RFID reader When finger = Right-index, Yellow-LED activated: Card responds to interrogation and indicator ON. When finger = Right-thumb, Blue-LED activated: When finger = unknown, Red-LED activated on the Card for a duration of two seconds. Figure 5.3: Generic Testing Procedure As illustrated in Figure 5.3, any fingerprint placed on the fingerprint module, which does not match the left-index and left-thumb of the authentic cardholder’s template, will result in “NO-interrogation” from the reader. Additionally, the following Light emitting diodes (LED) are also activated: 96 1. Yellow LED is activated on the card when the detected fingerprint matches with the Right-index finger of the authentic cardholder. 2. Blue LED is activated on the card when the detected fingerprint matches the with the Right-thumb of the authentic cardholder. 3. Red LED is activated on the card when the detected fingerprint does not match either the Right index, Right-thumb, Left-index, Left-thumb finger of the authentic cardholder. 5.2.1 Response to Reader An RFID Reader was employed to demonstrate the possible response of the Card to a Reader. The Card without the fingerprint authentication unit was brought at 5cm, 3cm, 2cm, and 1cm proximity (arbitrarily chosen but within the nominal read range of the HF passive tag), to the powered Reader. No-response to interrogation from the Reader was received. The authentic fingerprint authentication process was then applied within same proximity range as the former, and response was received. Table 5.1 shows the result of the test. Table 5. 1: Test Result of Bio-Thentic Card Proximity Range Without Fingerprint With fingerprint Authentication Authentication 5cm No response Response received 3cm No response Response received 2cm No response Response received 1cm No response Response received 97 Without the fingerprint authentication, the Card is shielded from communication as depicted in the result of Table 5.2. Hence, no Reader can communicate without the authorization by the authentic Card user. 5.2.2 Fingerprint Authentication Two distinctive fingers of the authentic card holder is required to activate the automation circuitry of the card. For the sake of testing, prints from the left thumb and left index fingers were used as the authentication elements. Table 5.2 gives the result of the authentication testing. The left index and left thumb were labeled as ‘A’ and ‘B’ respectively. Prints from the right index and right thumb labeled ‘C’ and ‘D’ respectively, were used as additional fingerprints and were stored in the library of the fingerprint module. Prints other than ‘A’, ‘B’, ‘C’, and ‘D’ were considered as print ‘E’, connoting that the User ‘E’ does not fall within the category of expected user. Table 5. 2: Result for Authentication Testing Template Interrogation Range 5cm 3cm 2cm 1cm A& Tag activated Tag activated Tag activated Tag activated B Green LED Green LED Green LED Green LED C Yellow LED Yellow LED Yellow LED Yellow LED D Blue LED Blue LED Blue LED Blue LED E Red LED Red LED Red LED Red LED Templates labeled ‘A & B’ activated the Card for interrogation and a GreenLED indicated the activation process for each of the selected interrogation range as 98 shown in Table 5. 2. Thus prints matching ‘A’ and ‘B’ were considered as classified user and possess the adequate clearance level to use the card. Prints matching label ‘C’ and ‘D’, were placed on the fingerprint module, but a no-tag- response was received while a corresponding Yellow-LED and Blue-LED were activated respectively. Hence, the prints ‘C’ and ‘D’ were considered as classified user, but do not possess adequate clearance level to use the card. Prints matching label ‘E’ were placed on the fingerprint module at different range as shown in Table 5.2, but a no-tag-response were received in all instance and a Red-LED activated. In essence, such user are considered as unclassified user and also, lacks the authority to use the card. This test clearly demonstrated that only an authentic user/subject can use the Card, and such subject must use two different fingerprints. Additionally, it classifies users into different categories, and a corresponding level of awareness is activated based on the classification. 5.2.3 Tag Reading The Card was activated for duration of 3seconds (additional slack time is added to compensate for user’s responsiveness) during which, it responded to the interrogation from the Reader. As shown in Table 5.2, only the templates labeled ‘A & B’ could authenticate the Card. The communication process between the Reader and the Card takes an approximate of 73μ seconds at 13.56MHz frequency. This short operational time can be used as measure against clandestine tracking as well as relay attacks. 99 5.3 Risk Assessment In order to ascertain the probability of attack being successful, various known attacks were tested on the prototype. Unauthorized tag Read, and unauthorized tag use were the focus of this assessment. Malicious users to gain ‘authorized’ access to these Card. could use attacks such as tag manipulation, clipped circumvention, and fingerprint manipulation. 5.3.1 Tag Manipulation Owing to the architectural vulnerabilities of the RFID card system in which the tag can be read without the knowledge of the Cardholder even when such is unauthorized; a practical re-positioning of reader was conducted. An RFID reader was placed within various proximity of the RFID Card, but there was no response. This obeys the principle of the Faraday shield and clipped tag process as detailed in the chapter 3. Afterwards, the Card was authorized by its authorized user at proximities of 5cm, 3cm, and. At these various range, the Reader responded to the Card 5.3.2 Clip joint circumvention For the sake of testing, the Card was un-laminated, showing its internal circuitry as well as the antenna coil as shown in Figure 5.4. This was done with the view that an unauthorized user can successfully disassemble (completely remove the card envelop/lamination) the Card. Bridged using connector cable 100 Figure 5.4: Worse Case Scenario of Bio-Thentic Card-Physical State As shown in Figure 5.4, the clipped joint of the Card is connected to the tag via the relay circuitry of the Card. A conductor was placed between the joints of the microcontroller illustrated in Figure 5.4. The Card remained inactive. Further manipulation was then initiated. At this stage, the clipped joints were connected to a Connected to a power supply unit DC power supply unit of 5V as illustrated in Figure 5.5 Figure 5.5: Electrical manipulation of the clipped joint The power supply unit was adjusted to the operating voltage range at the miniature relay contact joint as shown in Figure 5.5. At proximities of 5cm, 3cm, and 1cm respectively, the Card responded to interrogation and became active. Hence, the attack was successful. 101 5.3.3 Fingerprint manipulation When an authentic cardholder authorizes a communication, a residue of the last fingerprint is retained on the surface of the fingerprint module as illustrated in figure 5.6. There are various means of forging print from such residue such as molding a silicone, gelatin, plastic clay, OHP film, and candle wax finger, but in this study, an OHP film system was adopted for forging the authentic fingerprint image. An OHP film was placed on the fingerprint module surface in alignment with the residual print on the surface of the fingerprint module (with the understanding that residual print belongs to the authentic cardholder). The control circuitry was powered-ON, and the film was mapped to the size of the print. Afterwards, the forged-film was placed carefully on the surface of the fingerprint module, to impersonate as the authentic fingerprint. This process was carried out on different diameter of films. The Bio-Thentic Card however did not respond to interrogation, maintaining its idle state. The activation process of the card requires matching of both the leftindex and left-thumb fingers. Hence, even if a forged finger could successfully deceive a live fingerprint scanner, it will still be practically infeasible to fool the fingerprint module based on residual image extraction. 5.4 Risk Assessment Analysis This prototype was designed such that two fingerprints (different finger template) of the authorized user were required to activate the Card for interrogation. This was considered as a secured practice to ensure against the possibilities of 102 manipulating the fingerprint scanner surface. Table 5.3 gives a detail analysis on the evaluation with respect to physical layer vulnerabilities of RFID Card. Table 5. 3: Bio-Thentic Risk Assessment Test Skimming Spoofing Unauthorized x Relay attack cloning Card-use Tracking Bio-Thentic Card Unauthorized Mitigation Privacy Vulnerabilities Card-read Physical-layer As shown in Table 5. 3, with a Bio-Thentic Card system; unauthorized use of Card can be effectively mitigated and other known physical-layer attacks, as well as reduce the probability of attack occurrence. The privacy of the Cardholder is kept safe. This is based on the understanding that the Card cannot respond to any interrogation except on the consent of the authentic Cardholder, and for a short period. Similarly, tracking the card or the Cardholder through the Card is practically infeasible since the Card is considered dead, until activated by the authentic Cardholder. Furthermore, the use of Bio-Thentic Card prevents any form of unauthorized reading of tag as well as card promiscuity to any reader which forms the basis for skimming and spoofing attack. Hence, a surreptitious reader will not be able to gather information about the card. In addition, the use of Bio-Thentic Card requires that only the authentic cardholder can activate the card for interrogation. In essence, the card cannot be used 103 by an unauthorized user, as well as, for an unauthorized purpose. Hence this Card prevents unauthorized tag use, while it also addresses other issues such as unauthorized tag read, and relay attacks. However, the Bio-Thentic Card does not guarantee against cloning attack. Though cloning of RFID tag is practically infeasible (Davide et al., 2010), a careful fabrication of the Bio-Thentic card can induce a tamper proof capability in the Card. Such tamper proof capability can be use to prevent against cloning attack. 5.5 Limitation of this prototype The clip joint of this card can be manipulated as shown in the electrical short circuiting process in Figure 5.5, given a very high level of precision and a relative knowledge of the internal circuitry of the card. Hence it may subject to high technical proficiency attack, in which state, access control may be practically undeniable. This limitation can however be prevented if the Bio-Thentic card can be fabricated in a way that any disassembling attempt will destroy the card antenna, and as well as the RFID chip. 5.6 Summary In this chapter, results from the design and fabrication processes of the BioThentic Card were discussed. It also included a practical demonstration of known attacks as a part of risk assessment of the prototype. 104 CHAPTER 6 CONCLUSION AND RECOMMENDATION 6.1 Introduction RFID Card is one of the most convenient practices for access control. It however poses some inherent security challenges that have led to diverse compromise of the triad-confidentiality, Integrity, and availability (CIA)- of information security. As a way to address some of the challenges in the RFID Card, this study developed a Bio-Thentic Card to prevent unauthorized use of Card. The Bio-Thentic card comprises clipped tag, Faraday shield, and biometric authentication. The proceeding sections gives contribution of this study to the security of RFID Card. In addition to that, recommendations for future works were also given. This chapter ends with Conclusion on the Bio-Thentic card. 105 6.2 Contribution The Bio-Thentic Card is the combination of three existing mitigation mechanism which are Faraday shield, Clipped-tag system, and Fingerprint biometric system; for combating unauthorized tag read, unauthorized tag interrogation and unauthorized access controlling system respectively. This is the first time such integration is used, and in this way. The Bio-Thentic Card system effectively mitigated known attacks on RFID Card. It also reduced the vulnerability rate of the RFID Card. 6.3 Future Work and Recommendation This prototype does not satisfy a real-time application requirement due to its portability. Additionally, it also does not effectively prevent an expert clip-tag circumventor. The following consideration can be given future research direction. x A combination of Bio-Thentic Card and computerized unit to further authenticate the Card based on a uniquely generated disparate fingerprint identity of the authentic user. This can effectively prevent clip-tag circumventors. x A combination of Bio-Thentic Card and RF sensor to further enhance authenticate the Card. With the Bio-Thentic unit being the input to the RF sensor and consequently, being the authenticator of the RFID tag. 106 6.4 Conclusion Following the results from the Bio-Thentic Card test and risk assessment in sections 5. 2, and 5. 3 of chapter 5 respectively; this prototype can therefore be said to combat known security challenges in the physical-layer of the RFID Card such as unauthorized use of tag, unauthorized tag read. However, there are still opportunities for improvement. 107 REFERENCES Aikaterini Mitrokotsa, M. R. (2010). Classification of RFID Attacks. Information Systems Frontiers , 12 (5), 491-505. Aikaterini Mitrokotsa, M. R. (2010). Classifying RFID attacks and defenses. Assocaition of Computing Machinery , 491-505. ALBERT B. JENG, L. -C. C. -E. (2009). SURVEY AND REMEDY OF THE TECHNOLOGIES USED FOR RFID TAGS AGAINST COUNTERFEITING. International Conference on Machine Learning and Cybernetics, (pp. 2975-2980). Baoding: IEEE. Anil Jain, a. S. (2001). Automatic Fingerprint Identification and Imaging System. In a. R. Henry C. Lee, Advances in Fingerprint Technology (pp. 285-336). Washington, D. C. : CRC Press. Anil Jain, L. H. (February,2000). Biometric Identification. Communication of the ACM , Vol. 43, No. 2, 91-98. Ari Juels, a. R. (2003). Squealing Euros: Privacy Protection in RFID-Enabled. In R. Wright, & R. Wright (Ed. ), Financial Cryptography (Vol. 2742, pp. 103-121). Springer Berlin / Heidelberg. Ari Juels, D. M. (2005). Security and Privacy Issues in E-passports. IEEE, International Conference on Security and Privacy for Emerging Areas in Communications Networks , 0-7695-2369-2/05. Ari Juels, R. L. (2003,). The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. Proceedings of the 10th ACM conference on Computer and communications security (pp. 103-111). Was hington, DC,: ACM. 108 Ari Juels, R. L. (2003,). The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. Proceedings of the 10th ACM conference on Computer and communications security (pp. 103-111). Was hington, DC,: ACM. Bhaskar, S. M. (2008). Is RFID Technology Secure and Private? In a. M. SYED AHSON, RFID HANDBOOK Applications, Technology,Security, and Privacy (pp. 469-484). Boca Raton, FL : CRC Press Taylor & Francis Group. Bhaskar, S. M. (2008). Is RFID Technology Secure and Private? In a. M. SYED AHSON, RFID HANDBOOK: Applications, Technology, Security, and Privacy (pp. 469-484). Boca Raton, FL : Taylor & Francis Group, LLC. Bing-Zhong jing, P. P. (2010). Anti-spoofing system for RFID access control combining with face recognition. International Conference on Machine Learning and Cybernetics, Qingdao (pp. 978-1-4244-6527-9/10/). Quigdao: IEEE. Bleeker, A. (2007, September 18). A semantics for BAN logic. Retrieved June 2-15, 2011, from http://dimacs. rutgers. edu/Workshops/Security/program2/bleeke Boris Danev, T. S. -B. (2009). physical-layer identification of RFID device. USENIX Security Symposium , (pp. 199-214). Brianne Christine Vollmer, B. (2006). BIOMETRICS, RFID TECHNOLOGY, AND THE EPASSPORT: ARE AMERICANS RISKING PERSONAL SECURITY IN THE FACE OF TERRORISM? Washington DC: Georgetown University. C. R. Prashanth, S. P. (2009, January 9-10). Iris Feature Extraction using Directional Filter Bank for Personal Identification. Association of Computing Machinery , 1-8. Chao Li, a. J. (2010). A Two-Factor Authentication Design of Fingerprint Recognition System Based on DSP and RF Card. IEEE (pp. 441-445). IEEE. 109 Chien Eao Lee, a. N. (2009). Fingerprint Image Processing and Minutiae Extraction for Fuzzy Vault. MoMM (pp. 36-43). Kuala Lumpur, Malaysia: ACM. Chien, H. -Y. (2007). SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING , 4, 337340. Chiu, T. L. (2009). A Study of the SMART container monitoring system in the ocean shipping industry. ISL, (pp. 351-358). Istanbul, Turkey. CIRCULAR, D. (2010, June 21). Manual of Regulations and Procedures for Federal Radio Frequency. Retrieved July 03, 2011, from DEFENSE INFORMATION SYSTEMS AGENCY: http://www. disa. mil/pubs/circulars/pdf/dc3001001. pdf Constantinos Kolias, V. K. (2009). A Secure and Efficient Authentication Protocol for Passive RFID Tags. IEEE ISWCS , 36-40. Constantinos Kolias, V. K. (2009). A Secure and Efficient Authentication Protocol for Passive RFID Tags. IEEE ISWCS , 36-40. Corps, U. M. (1999). Antenna Handbook (Vols. MCRP 3-40. 3C). Washington, D. C: DEPARTMENT OF THE NAVY. Crosbie, M. (2005, November). Biometrics for Enterprice Security. Network Security , pp. 4-8. Cytron, T. (2011, November 24). SN-FRP-UART. Johor Bahru, Malaysia. Dale R. Thompson, E. r. (2009, November 19). 'Fingerprinting' RFID Tags: Researchers Develop Anti-Counterfeiting Technology. Retrieved June 2-15, 2011, from PHYSORG. COM: http://www. physorg. com/news177842859. html David Molnar, a. D. (2004). Privacy and Security in Library RFID: Issues, Practices, and Architectures. CCS , 210-219. 110 Davide Maltoni, D. M. (2009). Handbook on Fingerprint recognition. London: Springer-Verlag London Limited 2009. Davide zanetti, B. d. (2010). Physical-layer identification of UHF tags. MobiCom '10: Proceedings of the sixteenth annual international conference on Mobile computing and networking (pp. 978-1-4503-0181). Illinois,USA: ACM. Dong-Lang Wu, W. W. -Z. (2010). ACCESS CONTROL BY RFID AND FACE RECOGNITION ON NEURAL NETWORK. Machine Learning and Cybernetics (ICMLC), 2010 International Conference (pp. 675-680). IEEE. Feng Gao, J. T. (2008). An Algorithm to Produce Temporally and Spatially Continuous MODIS-LAI Time series. Geoscience and Remote Sensing Letters, (pp. 60-64). IEEE. Feng Gao, J. T. (2008). An Algorithm to Produce Temporally and Spatially Continuous MODIS-LAI Time series. Geoscience and Remote Sensing Letters, (pp. 60-64). IEEE. Finkenzeller, K. (2010). RFID HANDBOOK: FUNDAMENTALS AND APPLICATIONS IN CONTACTLESS SMART CARDS, RADIO FREQUENCY IDENTIFICATION AND NEAR-FIELD COMMUNICATION. (T. b. uller, Ed. ) Chichester, West Sussex: John Wiley & Sons, Ltd. Finkenziller, k. (2003). RFID handbook; Fundamental and application in contactless smart cards and identification. England: John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester. FitzPatrick Richard. (2008). MAXWELL’S EQUATIONS AND THEPRINCIPLES OF ELECTROMAGNETISM. New Delhi: Infinity Science Press LLC. Frank Thornton, B. H. (2006). RFID Security. (J. Kleinschmidt, Ed. ) Rockland: Syngress Publishing, Inc. . Geetha Govindan, S. K. (2009). Real time Security Management using RFID, Biometric and Smart Messages. ASID 2009. 3rd International Conference (pp. 282 - 285). IEEE. 111 Gerhard P. Hancke, M. G. (2005). An RFID Distance Bounding Protocol. SecureComm 2005. First International Conference (pp. 1-7). Athens, Greece: IEEE. Gibbs, M. D. (2010). Biometrics: Body odor Authentication Perception and Acceptance. SIGCAS Computers and Society , 16-23. Haines, B. (2010). Radio Frequency Identification Attacks. Boston, , USA: Seven Deadliest Wireless Technologies Attacks, Syngress. Hanan Sitli, h. H. -A. (2009). Technical Solutions for Privacy Protection in RFID. European Journal of Scientific Research , 500-508. Hancke, G. P. (2006). Practical Attacks on Proximity Identification Systems (Short Paper). Security and Privacy, 2006 IEEE Symposium (pp. 1081-6011/06). IEEE. Hongliang Wang. (2008). RFID Guardian Back-end Security Protocol. Amsterdam, Netherland: Vrije Universiteit Amsterdam. Joyce H. Wu, a. J. (2004). An Equivalent Circuit Model for a Faraday Cage Substrate Crosstalk Isolation Structure. Radio Frequency Integrated Circuits (RFIC) Symposium , pp. 0-7803-8333. Juels, A. (2006). RFID Security and Privacy: A Research Survey. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , 381-394. Juels, A. (2005). Strengthening EPC Tags Against Cloning. Proceedings of the 4th ACM workshop on Wireless security (pp. 67-75). ACM. Jussi Nummela, L. U. (2007). 13,56 MHz RFID Antenna for Cell Phone Integrated Reader. IEEE , 1088-1091. Kamran AHSAN, H. S. (2010). RFID Applications: An Introductory and Exploratory Study. IJCSI International Journal of Computer Science Issues , 1-7. Kerr, I. (2007, October). The internet of people? Reflections on the Future Regulation of Human-Implantable Radio Frequency Identification. Retrieved 112 June 2-15, 2011, from Bruce Sterling, “Go Ahead, Chip Me,” Wired Magazine, October 2007, http://: tp://www. idtrail. org Langheinrich, M. (2009). A survey of RFID privacy approaches. Personal and Ubiquitous Computing , 13 (6), 413-421. LIANG, B. (2010). Security and Performance Analysis for RFID Protocols. Singapore: Singapore Management University. M. Babaie, a. H. (2010). Efficient Detecting of RFID Tag CloningAttacks using Chaos Theory. International Conference on Communication Engineering (pp. 116-121). UNiversity of Sistan and Baluchestan. Marci Meingast, J. K. (2007). Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond. JOURNAL OF COMMUNICATIONS, VOL. 2, NO. 7, (pp. 36-48). ACADEMY PUBLISHER. Marlin H. Mickle, j. T. (2007, October 12). Intellectual Property and Ubiquitous RFID. Recent Patents on Electrical Engineering , pp. 59-67. Melanie R. Rieback, B. C. (2005, July). RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. Australasian Conference on Information Security and Privacy(ACISP). , 62-69. MiniMe, a. M. (2006, June 2). rfid-zapper. Retrieved June 2-15, 2011, from RFIDZapper(EN): http://itp. nyu. edu/everybit/blog/media/ Monica Nogueira, a. N. (2009). Uses of RFID Technology in U. S. Identification Documents. Institute of Homeland Security Solution. Mr. Tan Jin Soon, a. D. (2008). RFID security. Synthesis journal , 033-038. Nicolai Marquardt, A. S. (2010). Visible and Controllable RFID Tags. '10: Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems (pp. 3057-3062). Atlanta, GA, USA: ACM. 113 Nimish Vartak, A. P. (2007). Protecting the privacy of Passive RFID tags. maryland, Baltimore, U. S. A. Organization, f. E. -o. (2008, June 17-18). http://www. oecd. org/dataoecd/19/420892347. pdf; organization for economic co-operation and development:RFID OECD policy Guidance. Retrieved June 2-15, 2011, from http://www. oecd. org Paul A. Moskowitz, A. L. (2007). A Privacy-Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag. Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference (pp. 348-351). IEEE. Paul A. Moskowitz, A. L. (2007). A Privacy-Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag. Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference (pp. 348-351). IEEE. Paul A. Moskowitz, A. L. (2007). A Privacy-Enhancing Radio Frequency Identification Tag:Implementation of the Clipped Tag. IEEE International Conference , 0-7695-2788-4/07 . Pedro Peris-Lopez, J. C. -C. (2010). Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks. arXiv , 1-31. Peter J. Hawrylak, M. M. (2008). RFID Tags. In Y. Z. Lu Yan, THE INTERNET OF THINGS (pp. 14-45). London: Taylor & Francis Group, LLC. Rao, S. (2007). A Secure Architecture for the Use of RFID at Home. GRASP Symposium (pp. 191-192). Wichita: Wichita State University. Rubin, J. (2011, June 28). Michael Faraday: The Invention of Faraday Cage. Retrieved June 28, 2011, from Following the path of Discovery: http://www. juliantrubin. com/bigten/faradaycageexperiments. html Samuel Silver, and Hubert M. James. (1949). Microwave Antenna Theory and Design (First edition ed. ). (S. Silver, Ed. ) New York. Toronto. London, U. k, U. S. A: McGraw-Hill Book Company. 114 Shang-Ping, W. (2011). An Authentication Protocol for RFID Tag and Its Simulation. Journal of Network , 446-453. Shi Yong-Dong, P. y. -Y. -M. (2009). the RFID Application in Logistics and Supply Chain Management. Research Journal of Applied Sciences , 57-61. Shlomi Dolev, M. K. (2008). Low Overhead RFID Security. In a. M. SYED AHSON, RFID HANDBOOK: Applications, Technology, Security, and Privacy (pp. 589-602). Boca Raton: CRC Press, Taylor & Francis Group, LLC. Simson Garfinkel, a. H. (2005, June 2). UNDERSTANDING RFID TECHNOLOGY. Swedberg, C. (2009). British Touring car Championship track tires. RFID journal . Thomas H. kean, L. H. -v. (2002). THE 9/11 COMMISSION REPORT. Tobias Scheidat, A. E. (2006). Parameter Optimization for Biometric Fing Recognition using Genetic Algorithms. MM & Sec (pp. 130-134). Geneva, Switzerland: ACM. 7RQYDQ'HXUVHQDQG6DßVD5DGRPLURYLF(2008). Security of RFID Protocols – A Case Study. STM, 2008 , 1-11. Torin Monahan, a. J. (2010). Implanting inequality: Empirical evidence of social and ethical risks of implantable radio-frequency identification (RFID) devices. International Journal of Technology Assessment in Health Care. , 370-376. Torstein, H. (2006). Security and Privacy in RFID Applications. NTNU. Vecca, J. (2007). Biometric technologies and Verification systems. (K. Pamela Chester, Ed. ) Burlington, MA 01803, USA, USA: Elsevier Inc. Vladimir Brik, S. B. Vladmir brik, S. B. (2008). Wireless Device Identification with Radiometric Signature. MobiCom '08: Proceedings of the 14th ACM international 115 conference on Mobile computing and networking (pp. 978-1-60558-096). ACM. Wang, H. (2008). RFID Guardian Back-end Security Protocol. Amsterdam: Vrije Universiteit, Amsterdam, The Netherlands. Y. -C. Lee, Y. -C. H. -S. -C. (2009). A New Ultralightweight RFID protocol with Mutual Authentication. Information Engineering, 2009. ICIE '09. WASE International Conference (pp. 58-61). IEEE. Y. -C. Lee, Y. -C. H. -S. -C. (2009). A New Ultralightweight RFID protocol with Mutual Authentication. Information Engineering, 2009. ICIE '09. WASE International Conference (pp. 58-61). IEEE. Yossef Oren, a. A. (2010). RFID-Based Electronic Voting: What Could Possibly Go Wrong? RFID, 2010 IEEE International Conference (pp. 118-125). IEEE. Yuhanim Hani Binti Yahaya, M. R. (2009). Fingerprint Biometrics Authentication on Smart Card. ICCEE '09. Second International Conference on Computer and Electrical Engineering (pp. 671-673). IEEE. Yum, J. , Yoo, B. , Park, K. , & Jang, J. (2010). Smart card with an integrated electrical switch for secure operation. IEEE. YUNG-CHIN CHEN, W. -L. W. -S. (2006). Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection. Asian Journal of health and Information Science , 189-203. Zhibin Zhou, a. D. (2007). RFID Keeper: An RFID Data Access Control Mechanism. Global Telecommunications Conference (pp. 4570-4574). IEEE. Zia Saquib, N. S. (2011). Voiceprint Recognition Systems for Remote Authentication-A Survey. International Journal of Hybrid Information Technology , Vol. 4, No. 2,, 79-98. 116 Zuo, Y. (2010). Survivable RFID Systems: Issues, Challenges, and Techniques. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions (pp. 406-418). IEEE. 117 APPENDIX A PROGRAM CODE IN ASSEMBLY LANGUAGE ; Program code for fingerprint Storage and Matching ; Designed by Ikuesan Richard Adeyemi ; Assembler used: AVR studio 4 ; Microcontroller used: Atmega 8515 . include"m8515def. inc" . DEF TEMP =R16 ;general scratch space . DEF TEMP2=R17 . DEF WORKER=R23 . DEF STORE1=R18 . DEF STORE2=R19 . DEF STORE3=R20 . DEF STORE4=R21 . DEF STORE5=R22 . EQU MODE_0= 4 . EQU MODE_1= 5 . EQU MODE_2= 6 . EQU MODE_3= 7 . EQU BAUD_RATE_HIGH=0 . EQU BAUD_RATE_LOW=25 ; BAUD RATE OF 19200. . . . ORG 0x000 RJMP START;Reset Handler . ORG 0X001 RETI ; IRQ0 Handler RETI ; IRQ1 Handler . ORG 0X002 . ORG 0X003 118 RETI ; Timer1 Capture Handler RETI ; Timer1 Compare A Handler RETI ; Timer1 Compare B Handler RETI ; Timer1 Overflow Handler RETI ; Timer0 Overflow Handler RETI ; SPI Transfer Complete Handler RETI ; USART RX Complete Handler RETI ; UDR0 Empty Handler RETI ; USART TX Complete Handler RETI ; Analog Comparator Handler RETI ; IRQ2 Handler RETI ; Timer0 Compare Handler RETI ; EEPROM Ready Handler RETI ; Store Program memory Ready . ORG 0X004 . ORG 0X005 . org 0x006 . ORG 0X007 . ORG 0X008 . ORG 0X009 . ORG 0X00A . ORG 0X00B . ORG 0X00C . ORG 0X00D . ORG 0X00E . ORG 0X00F . ORG 0X010 START: LDI TEMP,255 OUT DDRA,TEMP OUT DDRB,TEMP OUT DDRD, TEMP OUT DDRC, TEMP 119 LDI TEMP,HIGH(RAMEND) OUT SPH,TEMP LDI TEMP,LOW(RAMEND) OUT SPL,TEMP UART_INIT: CLI LDI TEMP2, BAUD_RATE_HIGH LDI TEMP, BAUD_RATE_LOW OUT UBRRH, TEMP2 OUT UBRRL, TEMP LDI TEMP, (1<<RXEN)|(1<<TXEN);|(1<<RXCIE) OUT UCSRB, TEMP LDI (1<<URSEL)|(0<<UMSEL)|(0<<USBS)|(1<<UCSZ1)|(1<<UCSZ0) OUT UCSRC, TEMP SEI RCALL DELAY POLLING_UNIT: NOP NOP INC R22 CPI R22,5 BRGE RELAX SEARCHING: LDI ZH, HIGH(INPUT_MODE*2) LDI ZL, LOW(INPUT_MODE*2) CLR WORKER WUNMI: LPM TEMP, Z RCALL USART_TRANSMIT RCALL DELAY LDI TEMP2,(1<<TXC) OUT UCSRA, TEMP2 ADIW Z, 1 TEMP, 120 INC WORKER CPI WORKER,8 BRNE WUNMI LDI R21, 8 POSES_FIRSTLY: RCALL USART_RECEIVE OUT PORTA, TEMP DEC R21 CPI R21, 0X03 BREQ CHECKER_FIRSTLY GOT_FIRSTLY: CPI R21, 0X00 BRNE POSES_FIRSTLY RJMP ERROR_CHECK_FIRSTLY CHECKER_FIRSTLY: MOV R0, TEMP RJMP GOT_FIRSTLY ERROR_CHECK_FIRSTLY: MOV TEMP, R0 CPI TEMP, 0X00 BREQ OK_FIRSTLY RJMP ERROR_FIRSTLY OK_FIRSTLY: LDI TEMP, 0B11110000 OUT PORTC, TEMP RCALL LONG_DELAY RCALL LONG_DELAY RJMP POLLING_UNIT2 ERROR_FIRSTLY: LDI TEMP, 0B10101010 OUT PORTC, TEMP RCALL LONG_DELAY RCALL LONG_DELAY RJMP POLLING_UNIT 121 RELAX: SLEEP ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; POLLING_UNIT2: SBI PORTB, 7 NOP NOP RCALL LONG_DELAY RCALL LONG_DELAY CBI PORTB, 7 FINISHED: NOP NOP LDI TEMP, 0XFF OUT PORTA, TEMP RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY LDI TEMP, 0X00 OUT PORTA, TEMP RJMP MATCHING RJMP FINISHED ;?????????????????????? ;??????????????????????????????????? ; BEGINNING OF THE MATCH PROCESS ;??????????????????????????????????? MATCHING: LDI TEMP, 0X00 OUT PORTA, TEMP ; OUT PORTB, TEMP OUT PORTC, TEMP 122 RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY NOP LDI ZH, HIGH(MATCHED_FINGERPRINT*2) LDI ZL, LOW(MATCHED_FINGERPRINT*2) CLR WORKER MATCH_UP: LPM TEMP, Z RCALL USART_TRANSMIT RCALL DELAY LDI TEMP2,(1<<TXC) OUT UCSRA, TEMP2 ADIW Z, 1 INC WORKER CPI WORKER, 8 BRNE MATCH_UP LDI R21, 8 POSES_MATCH: RCALL USART_RECEIVE OUT PORTC, TEMP DEC R21 CPI R21, 0X04 BREQ CHECK_MATCHING GOT_MATCHING: CPI R21, 0X00 BRNE POSES_MATCH RJMP ERROR_CHECK_MATCHING CHECK_MATCHING: MOV R0, TEMP RJMP GOT_MATCHING ERROR_CHECK_MATCHING: MOV TEMP, R0 CPI TEMP, 0X02 ;library location for the left thumb print 123 BREQ RIGHT_THUMB CPI TEMP, 0X03 ;library location for the left thumb print BREQ LEFT_THUMB CPI TEMP, 0X04 ;library location for the right index print BREQ RIGHT_INDEX CPI TEMP, 0X05 ;library location for the left index finger BREQ LEFT_INDEX RJMP ERROR_MATCHING RIGHT_THUMB: SBI PORTD, MODE_2 RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY CBI PORTD, MODE_2 RCALL LONG_DELAY RJMP FINISHED LEFT_THUMB: SBI PORTB, 0 SBIS PORTB, 1 RJMP FINISHED RJMP ACTIVATE RIGHT_INDEX: SBI PORTD, MODE_1 RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY CBI PORTD, MODE_1 RCALL LONG_DELAY 124 RJMP FINISHED LEFT_INDEX: SBI PORTB, 1 SBIS PORTB, 0 RJMP FINISHED RJMP ACTIVATE ACTIVATE: SBI PORTB, 4 CBI PORTB, 6 SBI PORTD, MODE_3 RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY CBI PORTD, MODE_3 LDI TEMP, 0X00 OUT PORTB, TEMP RJMP FINISHED ERROR_MATCHING: SBI PORTD, 4 RCALL LONG_DELAY RCALL LONG_DELAY RCALL LONG_DELAY CBI PORTD, 4 RJMP FINISHED ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 ;USART RECEIVE AND TRANSMIT STAGE ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . USART_TRANSMIT: SBIS UCSRA, UDRE RJMP USART_TRANSMIT OUT UDR, TEMP RET USART_RECEIVE: SBIS UCSRA, RXC RJMP USART_RECEIVE IN TEMP, UDR RET ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ;END OF USART STAGE ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ;****Time Delay Subroutine ********************************* LONG_DELAY: RCALL DELAY RCALL DELAY RCALL DELAY RET DELAY: CLR R19 CLR R20 BODY: INC R19 CPI R19,250 BRNE BODY INC R20 CPI R20,20 BRNE BODY RET ;***Settling time delay for port to stabilise**************************** Short_delay: 126 ldi temp,255 tagain: dec temp brne tagain ret ;*****Look up table for fingerprint template***************************** INPUT_MODE: . DB 0XF5, 0X2D, 0X00, 0X01, 0X00, 0X00, 0X2C, 0XF5 MATCHED_FINGERPRINT: . DB 0XF5, 0X0C, 0X00, 0X00, 0X00, 0X00, 0X0C, 0XF5 ;????????????????????????????????????????????????????????????????????? ; This section of the code is used to enter the first fingerprint template which is stored ; in location 0x05 of the fingerprint module used for this study; in this case, it is the ;left index. Used for the storage process of fingerprints . include"m8515def. inc" . DEF TEMP =R16 ;general scratch space . DEF TEMP2=R17 . DEF WORKER=R23 . DEF STORE1=R18 . DEF STORE2=R19 . DEF STORE3=R20 . DEF STORE4=R21 . DEF STORE5=R22 . EQU MODE_1= 6 . EQU MODE_0= 5 . EQU MODE_2= 7 . EQU BAUD_RATE_HIGH=0 . EQU BAUD_RATE_LOW=25 ; BAUD RATE OF 19200. . . . ORG 0x000 RJMP START;Reset Handler . ORG 0X001 RETI ; IRQ0 Handler RETI ; IRQ1 Handler . ORG 0X002 127 . ORG 0X003 RETI ; Timer1 Capture Handler RETI ; Timer1 Compare A Handler RETI ; Timer1 Compare B Handler RETI ; Timer1 Overflow Handler RETI ; Timer0 Overflow Handler RETI ; SPI Transfer Complete Handler RETI ; USART RX Complete Handler RETI ; UDR0 Empty Handler RETI ; USART TX Complete Handler RETI ; Analog Comparator Handler RETI ; IRQ2 Handler RETI ; Timer0 Compare Handler RETI ; EEPROM Ready Handler RETI ; Store Program memory Ready . ORG 0X004 . ORG 0X005 . org 0x006 . ORG 0X007 . ORG 0X008 . ORG 0X009 . ORG 0X00A . ORG 0X00B . ORG 0X00C . ORG 0X00D . ORG 0X00E . ORG 0X00F . ORG 0X010 START: LDI TEMP,255 OUT DDRA,TEMP OUT DDRB,TEMP 128 OUT DDRD, TEMP OUT DDRC, TEMP LDI TEMP,HIGH(RAMEND) OUT SPH,TEMP LDI TEMP,LOW(RAMEND) OUT SPL,TEMP UART_INIT: CLI LDI TEMP2, BAUD_RATE_HIGH LDI TEMP, BAUD_RATE_LOW OUT UBRRH, TEMP2 OUT UBRRL, TEMP LDI TEMP, (1<<RXEN)|(1<<TXEN);|(1<<RXCIE) OUT UCSRB, TEMP LDI (1<<URSEL)|(0<<UMSEL)|(0<<USBS)|(1<<UCSZ1)|(1<<UCSZ0) OUT UCSRC, TEMP SEI RCALL DELAY POLLING_UNIT: NOP NOP INC R22 CPI R22,5 BRGE RELAX SEARCHING: LDI ZH, HIGH(INPUT_MODE*2) LDI ZL, LOW(INPUT_MODE*2) CLR WORKER WUNMI: LPM TEMP, Z RCALL USART_TRANSMIT RCALL DELAY LDI TEMP2,(1<<TXC) TEMP, 129 OUT UCSRA, TEMP2 ADIW Z, 1 INC WORKER CPI WORKER,8 BRNE WUNMI LDI R21, 8 POSES_FIRSTLY: RCALL USART_RECEIVE OUT PORTA, TEMP DEC R21 CPI R21, 0X03 BREQ CHECKER_FIRSTLY GOT_FIRSTLY: CPI R21, 0X00 BRNE POSES_FIRSTLY RJMP ERROR_CHECK_FIRSTLY CHECKER_FIRSTLY: MOV R0, TEMP RJMP GOT_FIRSTLY ERROR_CHECK_FIRSTLY: MOV TEMP, R0 CPI TEMP, 0X00 BREQ OK_FIRSTLY RJMP ERROR_FIRSTLY OK_FIRSTLY: LDI TEMP, 0B11110000 OUT PORTC, TEMP RCALL LONG_DELAY RCALL LONG_DELAY RJMP POLLING_UNIT2 ERROR_FIRSTLY: LDI TEMP, 0B10101010 OUT PORTC, TEMP RCALL LONG_DELAY 130 RCALL LONG_DELAY RJMP POLLING_UNIT RELAX: SLEEP POLLING_UNIT2: SBI PORTD, 7 NOP NOP RCALL LONG_DELAY CBI PORTD, 7 ENTRY: ;FIRST STAGE LDI ZH, HIGH(FIRST_FINGERPRINT*2) LDI ZL, LOW(FIRST_FINGERPRINT*2) CLR WORKER DOES: LPM TEMP, Z RCALL USART_TRANSMIT RCALL DELAY LDI TEMP2,(1<<TXC) OUT UCSRA, TEMP2 ADIW Z, 1 INC WORKER CPI WORKER, 8 BRNE DOES RESPONDS_FIRST: LDI R21, 8 ; LDI R22, 8 POSES_FIRST: RCALL USART_RECEIVE OUT PORTB, TEMP DEC R21 CPI R21, 0X03 131 BREQ CHECKER_FIRST GOT: CPI R21, 0X00 BRNE POSES_FIRST RJMP ERROR_CHECK CHECKER_FIRST: MOV R0, TEMP RJMP GOT ERROR_CHECK: MOV TEMP, R0 CPI TEMP, 0X00 BREQ OK_FIRST CPI TEMP, 0X07 BREQ OK_ALREADY RJMP ERROR OK_ALREADY: LDI TEMP, 0B11001100 OUT PORTC, TEMP RCALL LONG_DELAY RCALL LONG_DELAY LDI TEMP, 0X00 OUT PORTC, TEMP RCALL DELAY RJMP SECONDLY OK_FIRST: LDI TEMP, 0B11111111 OUT PORTC, TEMP RCALL LONG_DELAY RCALL LONG_DELAY LDI TEMP, 0 OUT PORTC, TEMP RCALL DELAY RJMP SECONDLY ERROR: 132 RJMP POLLING_UNIT2 ;SECOND STAGE ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SECONDLY: NOP LDI ZH, HIGH(SECOND_FINGERPRINT*2) LDI ZL, LOW(SECOND_FINGERPRINT*2) CLR WORKER DO_IT: LPM TEMP, Z RCALL USART_TRANSMIT RCALL DELAY LDI TEMP2,(1<<TXC) OUT UCSRA, TEMP2 ADIW Z, 1 INC WORKER CPI WORKER, 8 BRNE DO_IT LDI R21, 8 POSES_SECONDLY: RCALL USART_RECEIVE OUT PORTC, TEMP DEC R21 CPI R21, 0X03 BREQ CHECKER_SECONDLY GOT_SECONDLY: CPI R21, 0X00 BRNE POSES_SECONDLY RJMP ERROR_CHECK_SECONDLY CHECKER_SECONDLY: MOV R0, TEMP RJMP GOT_SECONDLY ERROR_CHECK_SECONDLY: MOV TEMP, R0 133 CPI TEMP, 0X00 BREQ OK_SECONDLY CPI TEMP, 0X07 BREQ OK_ALREADY_SECOND RJMP ERROR_SECONDLY OK_ALREADY_SECOND: LDI TEMP, 0B11001100 OUT PORTC, TEMP RCALL LONG_DELAY RCALL LONG_DELAY LDI TEMP, 0X00 OUT PORTC, TEMP RCALL DELAY RJMP THIRDLY OK_SECONDLY: LDI TEMP, 0B11110000 OUT PORTC, TEMP RCALL LONG_DELAY LDI TEMP, 0 OUT PORTC, TEMP RCALL DELAY RJMP THIRDLY ERROR_SECONDLY: RJMP POLLING_UNIT2 ;THIRD STAGE ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . THIRDLY: NOP LDI ZH, HIGH(THIRD_FINGERPRINT*2) LDI ZL, LOW(THIRD_FINGERPRINT*2) CLR WORKER DO_IT_AGAIN: LPM TEMP, Z RCALL USART_TRANSMIT 134 RCALL DELAY LDI TEMP2,(1<<TXC) OUT UCSRA, TEMP2 ADIW Z, 1 INC WORKER CPI WORKER, 8 BRNE DO_IT_AGAIN LDI R21, 8 POSES_THIRDLY: RCALL USART_RECEIVE OUT PORTA, TEMP DEC R21 CPI R21, 0X03 BREQ CHECKER_THIRDLY GOT_THIRDLY: SBI PORTD, MODE_2 CPI R21, 0X00 BRNE POSES_THIRDLY RJMP ERROR_CHECK_THIRDLY CHECKER_THIRDLY: MOV R0, TEMP RJMP GOT_THIRDLY ERROR_CHECK_THIRDLY: MOV TEMP, R0 CPI TEMP, 0X00 BREQ OK_THIRDLY CPI TEMP, 0X07 BREQ OK_ALREADY_THIRDLY RJMP ERROR_THIRDLY OK_ALREADY_THIRDLY: SBI PORTD, MODE_1 LDI TEMP, 0B11001100 OUT PORTC, TEMP 135 RCALL LONG_DELAY RCALL LONG_DELAY LDI TEMP, 0X00 OUT PORTC, TEMP RCALL DELAY RJMP FINISHED OK_THIRDLY: LDI TEMP, 0B10101010 OUT PORTC, TEMP RCALL LONG_DELAY RCALL LONG_DELAY LDI TEMP, 0 OUT PORTC, TEMP RCALL DELAY RJMP FINISHED ERROR_THIRDLY: SBI PORTD, 7 RCALL LONG_DELAY RCALL LONG_DELAY CBI PORTD, 7 RJMP POLLING_UNIT2 FINISHED: NOP NOP CBI PORTD, MODE_2 CBI PORTD, MODE_1 CBI PORTD, MODE_0 LDI TEMP, 0XFF OUT PORTA, TEMP LDI TEMP, 0X00 OUT PORTC, TEMP OUT PORTB, TEMP RCALL LONG_DELAY LDI TEMP, 0X00 136 OUT PORTA, TEMP RCALL LONG_DELAY RCALL LONG_DELAY RJMP FINISHED ;USART RECEIVE AND TRANSMIT STAGE USART_TRANSMIT: SBIS UCSRA, UDRE RJMP USART_TRANSMIT OUT UDR, TEMP RET USART_RECEIVE: SBIS UCSRA, RXC RJMP USART_RECEIVE IN TEMP, UDR RET ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ;END OF USART STAGE ;. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ;****Time Delay Subroutine ********************************* LONG_DELAY: RCALL DELAY RCALL DELAY RET DELAY: CLR R19 CLR R20 BODY: INC R19 CPI R19,250 BRNE BODY INC R20 CPI R20,10 137 BRNE BODY RET ;***Settling time delay for port to stabilise**************************** Short_delay: ldi temp,255 tagain: dec temp brne tagain ret ;*****Look up table for fingerprint template***************************** INPUT_MODE: . DB 0XF5, 0X2D, 0X00, 0X01, 0X00, 0X00, 0X2C, 0XF5 FIRST_FINGERPRINT: . DB 0XF5, 0X01, 0X00, 0X05, 0X03, 0X00, 0X07, 0XF5 SECOND_FINGERPRINT: . DB 0XF5, 0X02, 0X00, 0X05, 0X03, 0X00, 0X04, 0XF5 THIRD_FINGERPRINT: . DB 0XF5, 0X03, 0X00, 0X05, 0X03, 0X00, 0X05, 0XF5 138 APPENDIX B PROGRAM FLOW CHART start Reset Initialization Any live print on scanner? NO YES Left-Index Delay Right-index Delay YES Type: A, B, or C NO L-thumb Activated? YES FingerPrint type Activate A Activate B NO L-Index Activated? Activate C YES Activate card circuitry Activated card circuitry Delay Deactivate card circuitry 139