Cargando…

Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origi...

Descripción completa

Detalles Bibliográficos
Autores principales: Fernández-Caramés, Tiago M., Fraga-Lamas, Paula, Suárez-Albela, Manuel, Castedo, Luis
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5298601/
https://www.ncbi.nlm.nih.gov/pubmed/28029119
http://dx.doi.org/10.3390/s17010028
_version_ 1782505891092758528
author Fernández-Caramés, Tiago M.
Fraga-Lamas, Paula
Suárez-Albela, Manuel
Castedo, Luis
author_facet Fernández-Caramés, Tiago M.
Fraga-Lamas, Paula
Suárez-Albela, Manuel
Castedo, Luis
author_sort Fernández-Caramés, Tiago M.
collection PubMed
description The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.
format Online
Article
Text
id pubmed-5298601
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-52986012017-02-10 Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications Fernández-Caramés, Tiago M. Fraga-Lamas, Paula Suárez-Albela, Manuel Castedo, Luis Sensors (Basel) Article The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. MDPI 2016-12-24 /pmc/articles/PMC5298601/ /pubmed/28029119 http://dx.doi.org/10.3390/s17010028 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Fernández-Caramés, Tiago M.
Fraga-Lamas, Paula
Suárez-Albela, Manuel
Castedo, Luis
Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications
title Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications
title_full Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications
title_fullStr Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications
title_full_unstemmed Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications
title_short Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications
title_sort reverse engineering and security evaluation of commercial tags for rfid-based iot applications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5298601/
https://www.ncbi.nlm.nih.gov/pubmed/28029119
http://dx.doi.org/10.3390/s17010028
work_keys_str_mv AT fernandezcaramestiagom reverseengineeringandsecurityevaluationofcommercialtagsforrfidbasediotapplications
AT fragalamaspaula reverseengineeringandsecurityevaluationofcommercialtagsforrfidbasediotapplications
AT suarezalbelamanuel reverseengineeringandsecurityevaluationofcommercialtagsforrfidbasediotapplications
AT castedoluis reverseengineeringandsecurityevaluationofcommercialtagsforrfidbasediotapplications