TY - GEN
T1 - A tamper detection method for RFID tag data
AU - Yamamoto, Akira
AU - Suzuki, Shigeya
AU - Hada, Hisakazu
AU - Mitsugi, Jin
AU - Teraoka, Fumio
AU - Nakamura, Osamu
PY - 2008
Y1 - 2008
N2 - Recently, system designers, especially in the field of product life-cycle management system start considering use of user memory bank of UHF RFID tags. By storing most useful life-cycle data onto a tag, user can access to the data even without access to back-end databases. One of the major issues to make use of the user memory bank is detection of memory tampering. Although technology vendors start introducing new functionalities such as fine grained locking along with high capacity user memory, these tags with new functionalities require new non-standardized air protocol to operate - require modified version of reader/writers. Also, these tags are usually more expensive. In this paper, we introduce a novel approach to this problem: tag side write journaling mechanism and "Tag Memory Cloaking," which protect the journal by using. Tag Private Memory region, which is only readable and not writable from external devices such as a reader/writer, but writable by tag itself. Also, any write to the user memory automatically add journal entry - offset and length of the write - into the Tag Private Memory region. Later, a user can check existence of overlapped writes to user memory by checking the journal records. Since we have not modified any of air protocol, standard compliant read/writer can fully capable of all of our proposed operations: write to the tag, read, then detect unusual modification to user memory area. We have implemented the functionality to Programmable Battery Assisted Passive tag (BAP), then validated the method with several standard compliant reader/writers.
AB - Recently, system designers, especially in the field of product life-cycle management system start considering use of user memory bank of UHF RFID tags. By storing most useful life-cycle data onto a tag, user can access to the data even without access to back-end databases. One of the major issues to make use of the user memory bank is detection of memory tampering. Although technology vendors start introducing new functionalities such as fine grained locking along with high capacity user memory, these tags with new functionalities require new non-standardized air protocol to operate - require modified version of reader/writers. Also, these tags are usually more expensive. In this paper, we introduce a novel approach to this problem: tag side write journaling mechanism and "Tag Memory Cloaking," which protect the journal by using. Tag Private Memory region, which is only readable and not writable from external devices such as a reader/writer, but writable by tag itself. Also, any write to the user memory automatically add journal entry - offset and length of the write - into the Tag Private Memory region. Later, a user can check existence of overlapped writes to user memory by checking the journal records. Since we have not modified any of air protocol, standard compliant read/writer can fully capable of all of our proposed operations: write to the tag, read, then detect unusual modification to user memory area. We have implemented the functionality to Programmable Battery Assisted Passive tag (BAP), then validated the method with several standard compliant reader/writers.
UR - http://www.scopus.com/inward/record.url?scp=49049096211&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=49049096211&partnerID=8YFLogxK
U2 - 10.1109/RFID.2008.4519365
DO - 10.1109/RFID.2008.4519365
M3 - Conference contribution
AN - SCOPUS:49049096211
SN - 9781424417124
T3 - 2008 IEEE International Conference on RFID (Frequency Identification), IEEE RFID 2008
SP - 51
EP - 57
BT - 2008 IEEE International Conference on RFID (Frequency Identification), IEEE RFID 2008
T2 - 2008 IEEE International Conference on RFID (Frequency Identification), IEEE RFID 2008
Y2 - 16 April 2008 through 17 April 2008
ER -