BS PD CEN TR 16670-2014 Information technology RFID threat and vulnerability analysis《信息技术 射频识别威胁和脆弱性分析》.pdf
《BS PD CEN TR 16670-2014 Information technology RFID threat and vulnerability analysis《信息技术 射频识别威胁和脆弱性分析》.pdf》由会员分享,可在线阅读,更多相关《BS PD CEN TR 16670-2014 Information technology RFID threat and vulnerability analysis《信息技术 射频识别威胁和脆弱性分析》.pdf(74页珍藏版)》请在麦多课文档分享上搜索。
1、BSI Standards Publication PD CEN/TR 16670:2014 Information technology RFID threat and vulnerability analysisPD CEN/TR 16670:2014 PUBLISHED DOCUMENT National foreword This Published Document is the UK implementation of CEN/TR 16670:2014. The UK participation in its preparation was entrusted to Techni
2、cal Committee IST/34, Automatic identification and data capture techniques. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correc
3、t application. The British Standards Institution 2014. Published by BSI Standards Limited 2014 ISBN 978 0 580 83895 8 ICS 35.240.60 Compliance with a British Standard cannot confer immunity from legal obligations. This Published Document was published under the authority of the Standards Policy and
4、Strategy Committee on 30 June 2014. Amendments/corrigenda issued since publication Date T e x t a f f e c t e dPD CEN/TR 16670:2014TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CEN/TR 16670 June 2014 ICS 35.240.60 English Version Information technology - RFID threat and vulnerability analys
5、is Technologies de linformation - RFID, analyse vulnrabilit et de menace Informationstechnik - Analyse zur Bedrohung und Verletzlichkeit durch beziehungsweise von RFID This Technical Report was approved by CEN on 20 January 2014. It has been drawn up by the Technical Committee CEN/TC 225. CEN member
6、s are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal
7、, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMIT EUROPEN DE NORMALISATION EUROPISCHES KOMITEE FR NORMUNG CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels 2014 CEN All rights of exploitation in any form
8、and by any means reserved worldwide for CEN national Members. Ref. No. CEN/TR 16670:2014 EPD CEN/TR 16670:2014 CEN/TR 16670:2014 (E) 2 Contents Page Foreword 4 Introduction .5 1 Scope 6 2 Terms and definitions .6 3 Symbols and abbreviations 9 4 Threats and Attack scenarios 10 4.1 Introduction . 10 4
9、.2 Attacks to an RFID System with a Fake Reader 11 4.3 Attacks to a RFID system with a Fake Tag . 12 4.4 Attacks to a RFID system with a Fake Reader and a Fake Tag 12 4.5 Attack to a Real Tag with a Fake Reader and a Fake Tag 13 4.6 Attack to a Real Tag with a Fake Reader 13 4.7 Attack to a Real Rea
10、der with a Fake Tag 13 5 Vulnerabilities . 14 5.1 Introduction . 14 5.2 Denial of service . 14 5.3 Eavesdropping 14 5.4 Man in the Middle 15 6 Mitigation measures . 15 6.1 Introduction . 15 6.2 Mitigation measures for secured RFID Devices 15 6.2.1 Mitigation measures for tags . 15 6.2.2 Mitigation m
11、easures for readers . 15 6.2.3 Mitigation measures for the Air Interface Protocol . 15 6.3 Mitigation measures against attacks 15 6.3.1 Introduction . 15 6.3.2 Eavesdropping 15 6.3.3 Skimming . 15 6.3.4 Relay attack . 16 6.3.5 Denial of Service . 16 7 Conclusions 16 Annex A (informative) Attack scen
12、arios 18 A.1 Amusement parks takes visitors to RFID-land 18 A.1.1 Introduction . 18 A.1.2 Threat scenarios . 18 A.1.3 DPP objectives of relevance 19 A.1.4 Security objectives of relevance . 19 A.1.5 Privacy objectives of relevance 20 A.2 Purpose of Use and Consent . 20 A.2.1 Purpose 1 . 20 A.2.2 Pur
13、pose 2 (with explicit consent) 21 A.2.3 Purpose 3 (with no explicit consent . 21 A.3 Multi-tag and purpose RFID environment for Healthcare . 22 A.3.1 Scenario description - Emergency 22 A.3.2 The hospital RFID environment . 22 A.3.3 Arrival at the hospital . 23 A.3.4 Treatment at the hospital . 24 A
14、.3.5 The value of the drug prescribed 24 A.3.6 Returning home 24 A.3.7 The home RFID environment . 24 PD CEN/TR 16670:2014 CEN/TR 16670:2014 (E) 3 A.3.8 Drug repeat prescription and out of date drug recycling 25 Annex B Original Test Set ups and Results 26 B.1 Test Area 26 B.2 Equipment 26 B.3 Overv
15、iew of the Tests . 27 B.3.1 Introduction 27 B.3.2 Range tests 27 B.3.3 Write Tests . 27 B.3.4 Illicit Reading . 27 B.3.5 Eavesdropping . 28 B.3.6 Detection inside buildings 28 B.3.7 Combined EAS/RFID systems 28 B.4 Test procedures and results 28 B.4.1 General . 28 B.4.2 Reading range 30 B.4.3 Write
16、range . 37 B.4.4 Illicit reading 41 B.4.5 Eavesdropping . 46 B.4.6 Detection inside buildings 47 B.4.7 Combined EAS/RFID system 48 B.5 Analysis of results . 48 B.6 Conclusions . 49 Annex C Additional Test Set ups and Results 50 C.1 Introduction 50 C.2 Scope of tests 50 C.3 Documenting the results 50
17、 C.4 Equipment required for additional tests . 50 C.5 Description of tests . 51 C.5.1 Activation distance for HF system 51 C.5.2 Activation distance for UHF system 52 C.5.3 Eavesdropping tests for HF system 53 C.5.4 Eavesdropping tests for UHF system . 55 C.6 Test results 56 C.6.1 Equipment utilised
18、 during the tests 56 C.6.2 Description of Tests 56 Bibliography 70 PD CEN/TR 16670:2014 CEN/TR 16670:2014 (E) 4 Foreword This document (CEN/TR 16670:2014) has been prepared by Technical Committee CEN/TC 225 “AIDC Technologies”, the secretariat of which is held by NEN. Attention is drawn to the possi
19、bility that some of the elements of this document may be the subject of patent rights. CEN and/or CENELEC shall not be held responsible for identifying any or all such patent rights. This Technical Report is one of a series of related deliverables, which comprise mandate 436 Phase 2. The other deliv
20、erables are: EN 16570, Information technology Notification of RFID The information sign and additional information to be provided by operators of RFID application systems EN 16571, Information technology RFID privacy impact assessment process EN 16656, Information technology - Radio frequency identi
21、fication for item management - RFID Emblem (ISO/IEC 29160:2012, modified) CEN/TR 16684, Information technology Notification of RFID Additional information to be provided by operators CEN/TS 16685, Information technology Notification of RFID The information sign to be displayed in areas where RFID in
22、terrogators are deployed CEN/TR 16669, Information technology Device interface to support ISO/IEC 18000-3 CEN/TR 16671, Information technology Authorisation of mobile phones when used as RFID interrogators CEN/TR 16672, Information technology Privacy capability features of current RFID technologies
23、CEN/TR 16673, Information technology RFID privacy impact assessment analysis for specific sectors CEN/TR 16674, Information technology Analysis of privacy impact assessment methodologies relevant to RFID PD CEN/TR 16670:2014 CEN/TR 16670:2014 (E) 5 Introduction In response to the growing deployment
24、of RFID systems in Europe, the European Commission published in 2007 the Communication COM(2007) 96 RFID in Europesteps towards a policy framework. This Communication proposed steps which needed to be taken to reduce barriers to adoption of RFID whilst respecting the basic legal framework safeguardi
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSPDCENTR166702014INFORMATIONTECHNOLOGYRFIDTHREATANDVULNERABILITYANALYSIS 信息技术 射频 识别 威胁 脆弱 分析 PDF

链接地址:http://www.mydoc123.com/p-397365.html