CEN TR 16670-2014 Information technology - RFID threat and vulnerability analysis《信息技术 射频识别的威胁和脆弱性分析》.pdf
《CEN TR 16670-2014 Information technology - RFID threat and vulnerability analysis《信息技术 射频识别的威胁和脆弱性分析》.pdf》由会员分享,可在线阅读,更多相关《CEN TR 16670-2014 Information technology - RFID threat and vulnerability analysis《信息技术 射频识别的威胁和脆弱性分析》.pdf(74页珍藏版)》请在麦多课文档分享上搜索。
1、BSI Standards PublicationPD CEN/TR 16670:2014Information technology RFID threat and vulnerabilityanalysisPD CEN/TR 16670:2014 PUBLISHED DOCUMENTNational forewordThis Published Document is the UK implementation of CEN/TR 16670:2014.The UK participation in its preparation was entrusted to Technical Co
2、mmittee IST/34, Automatic identification and data capture techniques.A list of organizations represented on this committee can be obtained on request to its secretary.This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct applic
3、ation. The British Standards Institution 2014.Published by BSI Standards Limited 2014ISBN 978 0 580 83895 8ICS 35.240.60Compliance with a British Standard cannot confer immunity from legal obligations.This Published Document was published under the authority of the Standards Policy and Strategy Comm
4、ittee on 30 June 2014.Amendments/corrigenda issued since publicationDate T e x t a f f e c t e dPD CEN/TR 16670:2014TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CEN/TR 16670 June 2014 ICS 35.240.60 English Version Information technology - RFID threat and vulnerability analysis Technologies
5、 de linformation - RFID, analyse vulnrabilit et de menace Informationstechnik - Analyse zur Bedrohung und Verletzlichkeit durch beziehungsweise von RFID This Technical Report was approved by CEN on 20 January 2014. It has been drawn up by the Technical Committee CEN/TC 225. CEN members are the natio
6、nal standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slov
7、akia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMIT EUROPEN DE NORMALISATION EUROPISCHES KOMITEE FR NORMUNG CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels 2014 CEN All rights of exploitation in any form and by any mean
8、s reserved worldwide for CEN national Members. Ref. No. CEN/TR 16670:2014 EPD CEN/TR 16670:2014CEN/TR 16670:2014 (E) 2 Contents Page Foreword 4 Introduction .5 1 Scope 6 2 Terms and definitions .6 3 Symbols and abbreviations 9 4 Threats and Attack scenarios 10 4.1 Introduction . 10 4.2 Attacks to an
9、 RFID System with a Fake Reader 11 4.3 Attacks to a RFID system with a Fake Tag . 12 4.4 Attacks to a RFID system with a Fake Reader and a Fake Tag 12 4.5 Attack to a Real Tag with a Fake Reader and a Fake Tag 13 4.6 Attack to a Real Tag with a Fake Reader 13 4.7 Attack to a Real Reader with a Fake
10、Tag 13 5 Vulnerabilities . 14 5.1 Introduction . 14 5.2 Denial of service . 14 5.3 Eavesdropping 14 5.4 Man in the Middle 15 6 Mitigation measures . 15 6.1 Introduction . 15 6.2 Mitigation measures for secured RFID Devices 15 6.2.1 Mitigation measures for tags . 15 6.2.2 Mitigation measures for read
11、ers . 15 6.2.3 Mitigation measures for the Air Interface Protocol . 15 6.3 Mitigation measures against attacks 15 6.3.1 Introduction . 15 6.3.2 Eavesdropping 15 6.3.3 Skimming . 15 6.3.4 Relay attack . 16 6.3.5 Denial of Service . 16 7 Conclusions 16 Annex A (informative) Attack scenarios 18 A.1 Amu
12、sement parks takes visitors to RFID-land 18 A.1.1 Introduction . 18 A.1.2 Threat scenarios . 18 A.1.3 DPP objectives of relevance 19 A.1.4 Security objectives of relevance . 19 A.1.5 Privacy objectives of relevance 20 A.2 Purpose of Use and Consent . 20 A.2.1 Purpose 1 . 20 A.2.2 Purpose 2 (with exp
13、licit consent) 21 A.2.3 Purpose 3 (with no explicit consent . 21 A.3 Multi-tag and purpose RFID environment for Healthcare . 22 A.3.1 Scenario description - Emergency 22 A.3.2 The hospital RFID environment . 22 A.3.3 Arrival at the hospital . 23 A.3.4 Treatment at the hospital . 24 A.3.5 The value o
14、f the drug prescribed 24 A.3.6 Returning home 24 A.3.7 The home RFID environment . 24 PD CEN/TR 16670:2014CEN/TR 16670:2014 (E) 3 A.3.8 Drug repeat prescription and out of date drug recycling 25 Annex B Original Test Set ups and Results 26 B.1 Test Area 26 B.2 Equipment 26 B.3 Overview of the Tests
15、. 27 B.3.1 Introduction 27 B.3.2 Range tests 27 B.3.3 Write Tests . 27 B.3.4 Illicit Reading . 27 B.3.5 Eavesdropping . 28 B.3.6 Detection inside buildings 28 B.3.7 Combined EAS/RFID systems 28 B.4 Test procedures and results 28 B.4.1 General . 28 B.4.2 Reading range 30 B.4.3 Write range . 37 B.4.4
16、Illicit reading 41 B.4.5 Eavesdropping . 46 B.4.6 Detection inside buildings 47 B.4.7 Combined EAS/RFID system 48 B.5 Analysis of results . 48 B.6 Conclusions . 49 Annex C Additional Test Set ups and Results 50 C.1 Introduction 50 C.2 Scope of tests 50 C.3 Documenting the results 50 C.4 Equipment re
17、quired for additional tests . 50 C.5 Description of tests . 51 C.5.1 Activation distance for HF system 51 C.5.2 Activation distance for UHF system 52 C.5.3 Eavesdropping tests for HF system 53 C.5.4 Eavesdropping tests for UHF system . 55 C.6 Test results 56 C.6.1 Equipment utilised during the tests
18、 56 C.6.2 Description of Tests 56 Bibliography 70 PD CEN/TR 16670:2014CEN/TR 16670:2014 (E) 4 Foreword This document (CEN/TR 16670:2014) has been prepared by Technical Committee CEN/TC 225 “AIDC Technologies”, the secretariat of which is held by NEN. Attention is drawn to the possibility that some o
19、f the elements of this document may be the subject of patent rights. CEN and/or CENELEC shall not be held responsible for identifying any or all such patent rights. This Technical Report is one of a series of related deliverables, which comprise mandate 436 Phase 2. The other deliverables are: EN 16
20、570, Information technology Notification of RFID The information sign and additional information to be provided by operators of RFID application systems EN 16571, Information technology RFID privacy impact assessment process EN 16656, Information technology - Radio frequency identification for item
21、management - RFID Emblem (ISO/IEC 29160:2012, modified) CEN/TR 16684, Information technology Notification of RFID Additional information to be provided by operators CEN/TS 16685, Information technology Notification of RFID The information sign to be displayed in areas where RFID interrogators are de
22、ployed CEN/TR 16669, Information technology Device interface to support ISO/IEC 18000-3 CEN/TR 16671, Information technology Authorisation of mobile phones when used as RFID interrogators CEN/TR 16672, Information technology Privacy capability features of current RFID technologies CEN/TR 16673, Info
23、rmation technology RFID privacy impact assessment analysis for specific sectors CEN/TR 16674, Information technology Analysis of privacy impact assessment methodologies relevant to RFID PD CEN/TR 16670:2014CEN/TR 16670:2014 (E) 5 Introduction In response to the growing deployment of RFID systems in
24、Europe, the European Commission published in 2007 the Communication COM(2007) 96 RFID in Europesteps towards a policy framework. This Communication proposed steps which needed to be taken to reduce barriers to adoption of RFID whilst respecting the basic legal framework safeguarding fundamental valu
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CENTR166702014INFORMATIONTECHNOLOGYRFIDTHREATANDVULNERABILITYANALYSIS 信息技术 射频 识别 威胁 脆弱 分析 PDF

链接地址:http://www.mydoc123.com/p-592276.html