EM410x RFID Cloned Card Detection System

Michal Krumnikl, Pavel Moravec, Petr Olivka, David Seidl

2015

Abstract

RFID tags are nowadays used for granting access to buildings, tracking goods, persons and animals, in electronic toll collection systems, mobile payments, and other application areas. The purpose of this paper is to propose a solution that is capable of detecting fake (cloned) low cost 125 kHz RFID tags. The paper is focusing on detecting clones and emulators of EM410x tags. The proposed method is based on modifying the RFID reader and exploiting the specific features and properties of the fake tags. The experiments performed with the RFID reader with the implementation of the proposed clone detection techniques have shown that it is possible to reliably detect the majority of the publicly available fake tags and emulators. Moreover, the reader is capable of deactivating some of the clone tags if necessary.

References

  1. Atmel Corporation (2014). ATA5577C Read/Write LF RFID IDIC 100 to 150 khz. Technical Datasheet, rev. 9187HRFID07/14.
  2. Blass, E.-O., Elkhiyaoui, K., and Molva, R. (2011). Tracker : security and privacy for RFID-based supply chains. In NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA, San Diego, UNITED STATES.
  3. de Koning Gans, G., Hoepman, J.-H., and Garcia, F. (2008). A practical attack on the MIFARE Classic. In Grimaud, G. and Standaert, F.-X., editors, Smart Card Research and Advanced Applications, volume 5189 of Lecture Notes in Computer Science, pages 267-282. Springer Berlin Heidelberg.
  4. Dowty, M. (2010). Software-only implementation of a passive low-frequency RFID tag, using an AVR microcontroller. Source code. Available at http://svn.navi.cx/misc/trunk/avrfid/avrfid.S.
  5. EM Microelectronic-Marin SA (2004). EM4100 read only contactless identification device. Technical Datasheet.
  6. Garcia, F., de Koning Gans, G., Verdult, R., and Meriac, M. (2012). Dismantling iclass and iclass elite. In Foresti, S., Yung, M., and Martinelli, F., editors, Computer Security ESORICS 2012, volume 7459 of Lecture Notes in Computer Science, pages 697-715. Springer Berlin Heidelberg.
  7. Hancke, G. (2005). A practical relay attack on ISO 14443 proximity cards. Technical report.
  8. Hancke, G. (2006). Practical attacks on proximity identification systems. In Security and Privacy, 2006 IEEE Symposium on, pages 6 pp.-333.
  9. Issovits, W. and Hutter, M. (2011). Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks. In RFID-Technologies and Applications (RFID-TA), 2011 IEEE International Conference on, pages 335- 342.
  10. Koh, R., Schuster, E. W., Chackrabarti, I., and Bellman, A. (2003). Securing the pharmaceutical supply chain. White Paper, Auto-ID Labs, Massachusetts Institute of Technology, pages 1-19.
  11. Koscher, K., Juels, A., Brajkovic, V., and Kohno, T. (2009). Epc RFID tag security weaknesses and defenses: Passport cards, enhanced drivers licenses, and beyond. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 7809, pages 33-42, New York, NY, USA. ACM.
  12. Krumnikl, M. (2007). Unique (EM4001) RFID emulator. Technical report, Department of Computer Science. VS? B - Technical University of Ostrava.
  13. Lehtonen, M., Ostojic, D., Ilic, A., and Michahelles, F. (2009). Securing RFID systems by detecting tag cloning. In Tokuda, H., Beigl, M., Friday, A., Brush, A., and Tobe, Y., editors, Pervasive Computing, volume 5538 of Lecture Notes in Computer Science, pages 291-308. Springer Berlin Heidelberg.
  14. Mackey, T. K. and Liang, B. A. (2011). The global counterfeit drug trade: patient safety and public health risks. Journal of pharmaceutical sciences, 100(11):4571- 4579.
  15. Mitrokotsa, A., Rieback, M., and Tanenbaum, A. (2010). Classifying RFID attacks and defenses. Information Systems Frontiers, 12(5):491-505.
  16. Oswald, D. and Paar, C. (2011). Breaking Mifare DESFire MF3ICD40: Power analysis and templates in the real world. In Preneel, B. and Takagi, T., editors, Cryptographic Hardware and Embedded Systems CHES 2011, volume 6917 of Lecture Notes in Computer Science, pages 207-222. Springer Berlin Heidelberg.
  17. Verdult, R., Garcia, F. D., and Balasch, J. (2012). Gone in 360 seconds: Hijacking with Hitag2. In Proceedings of the 21st USENIX Conference on Security Symposium, Security'12, pages 37-37, Berkeley, CA, USA. USENIX Association.
  18. Zanetti, D., Capkun, S., and Juels, A. (2013). Tailing RFID tags for clone detection. In NDSS.
Download


Paper Citation


in Harvard Style

Krumnikl M., Moravec P., Olivka P. and Seidl D. (2015). EM410x RFID Cloned Card Detection System . In Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS, ISBN 978-989-758-084-0, pages 76-82. DOI: 10.5220/0005229700760082


in Bibtex Style

@conference{peccs15,
author={Michal Krumnikl and Pavel Moravec and Petr Olivka and David Seidl},
title={EM410x RFID Cloned Card Detection System},
booktitle={Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS,},
year={2015},
pages={76-82},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005229700760082},
isbn={978-989-758-084-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS,
TI - EM410x RFID Cloned Card Detection System
SN - 978-989-758-084-0
AU - Krumnikl M.
AU - Moravec P.
AU - Olivka P.
AU - Seidl D.
PY - 2015
SP - 76
EP - 82
DO - 10.5220/0005229700760082