RFID Towards Digital Evidence A discussion on the use of RFID and encryption to create digital evidence within the scope of real-world process environments. Ver 1.0 8 January 2006 Bertus Pretorius Chief Systems Architect iPico Chairman: Standards SA – SC71H (EVI) Chairman: Standards SA – SC71K (AutoID) Head of Delegation SA: JTC1/SC31 Content • • • Definitions What is Digital Evidence The Case for Digital Evidence – Supply Chain – Vehicles – Product & Source Authenticity • • • • • Page 2 The Operational Environment Privacy Pro’s and Con’s of RFID Encryption Conclusion Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Definitions These definitions is within the scope of the presentation. • Risk: the chance of a negative outcome towards a material loss • Integrity: the assurance towards correctness as presented • Authenticity: the integrity, as a whole, as issued or created • Authority: the ultimate legal-person responsible • Confidentiality: a defined limited • Item: anything, which can be identified uniquely; people...artefact • People: all humans • Artefact: all non-human items • Set: a grouping, which can be identified uniquely • Real-world: the tangible 3-D world with live in • Scrutiny: multiple verifications from a different viewpoint Page 3 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Digital Evidence • Digital recording of an occurrence, which can be held in court – to a specific risk profile – to a deterministic integrity profile Æ Thus the recording and storage method must stand scrutiny before the data can be analysed • Digital Evidence proves: – That a specific Real-World-Occurrence did take place • • • • Place, which could included the state of the place Legal entities, both actively participating or not Date & Time Items – That a specific Real-World-Item is what it claims to be • Integrity of the item • Integrity of the source of the item Æ trail of accountability • Demographics of digital evidence – Usually remote – Usually off-line – Usually used in local decision making Page 4 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico The Trust Gap Positive identification of items is the key to digital evidence Representation of an item Identifier (tag) Real Item Person, Article Trust Gap Systems DB, Portals ICT & Marks Transaction Relationship Perception Relationship Value Relationship Identity Relationship Page 5 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Digital Evidence in the Supply Chain Brand owner requires control over supply chain activities to • protect brand integrity • eliminate counterfeit goods • prevent illegal trade The focus is: monitoring the transfer of goods Manufacturing Distribution & Whole Sale Dealers Clients Intelligent end-nodes with appropriate communications Page 6 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Digital Evidence in the Supply Chain Brand user requires reassurance regarding authenticity of goods - this must be guaranteed by a Trusted Third Party (TTP) The focus is: • verification of authenticity • transfer of liability Manufacturing Distribution & Whole Sale Dealers Clients Intelligent end-nodes with appropriate communications Page 7 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Digital Evidence in the Supply Chain Authenticate the Transaction When Goods are Transferred by Capturing Data identifying Crime Detection Digital Evidence - Supplier - Goods - Receiver - Time - Place - Authenticator Trend Analysis TTP Database Goods/Products/ Brand Authentication Manufacturing Distribution & Whole Sale Dealers Clients Intelligent end-nodes with appropriate communications Page 8 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Digital Evidence in the Supply Chain Crime Detection Digital Evidence Digital signing Trend Analysis Scope of SCTS TTP Time stamping Database Capture Transactions & Management information Manufacturing Distribution & Whole Sale Goods/Products/ Brand Authentication Dealers Intelligent end-nodes with appropriate communications Page 9 Using RFID towards Digital Evidence - January 2006 Public Key Infrastructure People ID & authentication Clients End node ID & authentication COPYRIGHT © 2006, iPico Electronic Vehicle Intelligence[EVI] • Basic premises of EVI – If all vehicles must carry an Electronic Registration Device [ERD], – then the following vehicles are assumed to be illegal, • • • • • vehicles that does not read (broken or no ERD) vehicles with an ERD that does not match vehicles identified to be illegal (black listed; suspect) vehicles not spotted according to real-world space-time These vehicles, in use, will stand out at the roadside! • prosecution of the illegals without harassment of the legals by identification of the legals with the illegals paying • EVI is a trust service – Providing high integrity vehicle spot-trails – On road alerts Æ black listing – Application leverage Page 10 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Example of an ERD Page 11 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico EVI Data Flow Spot EVI Info Spot Trail & Spot Alert Black/Suspect Listing Spotting Station NaTIS EVIS Application Application Application Page 12 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Digital Evidence Examples • Face value documents – Vehicle licenses – Certificates and legal documents – Way-bills Note the use of both 2-D barcodes & RFID is applicable • Proof of source – Anti-piracy of products; optical disks, pharmaceuticals, tires, etc. – Container seals Note the potential to control issuing and registration fraud • Proof of delivery – Digital evidence of the right goods at the right person Note that both the recipient and items can be digitally linked • Transfer of liability, thus controlling human processes Note in all these cases we only require an end-to-end encryption method Page 13 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Levels of Scrutiny • Electronic suspect selection within process free-flow – – – – • Suspect lists Contradictory information Real-world anomalies (behavioural scrutiny) “Civil disobedience” due to a lack of traceability Physical inspection after suspect selection or ad hoc – Self inspection – Cloning detection – Tamper detection • Digital data & physical verification in gating scenarios – Strong digital signatures – Item “finger prints” or “DNA” • Forensic level verification Timely detection of breach of integrity is the important aspect Page 14 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Auto-Identification Requirements • Spotting of processes in operation – Can not stop the process – Free-Flow spotting • Spotting of items, vehicles, people, animals, ect. – A large variant on the number of tags in the beam – A large variant on the time tags spend in the beam – High-speed dynamic populations of tags in the beam • Deployment cost – Re-use infrastructure – Optimise networking and data manipulation costs Note that spotting points are often off-line – Minimise requirement to change • Must be used in anti-crime efforts – High integrity ChipID for authenticity – Supports encrypted code structures Page 15 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Privacy • Various active lobby groups – Need to balance the rights of the individual • Privacy vs. Protection – National security risk perception influence • RFID threat can be limited by passive technologies – – – – – • limit in range (max 10 meters) line of sight (paint the reader yellow) limit of data transfer (low data rates & storage due to power limit) physical tamper evident clone restrictive Data control – Effective regulations – Effective enforcement of regulations – Limited content within single databases. Page 16 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Pro’s and Con’s of RFID Assume we deal only with an identifier RFID tag • Tag must have a unique ChipID – allow for item linking to the tag – allow for issuing fraud control and detection • Requires at least 256 bits on tag – 64 bits for a ChipID – written by the chip manufacturer • this allows for effective control since there are limited chip manufacturers • bad chip imitations tend not to work well as passive devices – 20 bits for source identity index – 172 bits for a ECC short message signature containing an 96bit “EIC” • Tag needs to be reliably read in 5ms to allow for effective; – multi-read – free-flow at high speeds • Requires a cost efficient reader – This is a function of the air-protocol (read-only reader) • Requires the spectrum to allow for high density free-flow tag scrutiny – Readers must be co-location & co-channel Page 17 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Lifecycle of an Identifier Trust Service Domain Manage the properties of the trust of an identifier = Active, Noted, Suspended, Revoked, etc. Issue an identifier Application Domain Link identifier identifier to to application application Link Register the identifier Manage the identifier integrity Expire/revoke the identifier Authenticate identifier identifier Authenticate Allow level level of of use use of of application application Allow Application veto-right veto-right Application Proof of of transaction transaction for for parties parties Proof Manage the mechanisms of trust & integrity Applications for issuing, management & use(verification) Page 18 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Conclusion • It is possible to control human behaviour using digital methods – – – – • • • It is possible to verify digital evidence in an off-line manner Integrity of identity is the key & the only prerequisite RFID can be used to achieve it – – – – – • without infringing on privacy or stopping processes in creating digital evidence and accountability Requires an unique ChipID Requires short message digital signatures Requires scrutiny Requires cost efficient verification tools (RFID Readers) Requires enough spectrum, which is optimised using Read-Only RFID with non-modulating or Tag-Talk-Only [TTO] RFID readers This in all requires a regulatory framework for: – the public key infrastructure, which includes encryption methods – remote connectivity & data transfer, storage, manipulation & access – dedicated spectrum environment Page 19 Using RFID towards Digital Evidence - January 2006 COPYRIGHT © 2006, iPico Thank You