(B-12) A password
will be decoded by
ha cking
(C-1) An
interrogator
will be stolen
(C-2) Can falsify
sales data using the
stolen interrogator
RFID data will be falsified,
and resal e of the book will
be successful
(B-2) Can falsify
sales data using a
stolen password
B C
A
0.3%
4.1%
B-1
(B-11) Can falsify sales
data using a password
stolen at another bookstore
Figure 4: FTA of shoplifting a book.
4.1 Fault Tree Analysis of RFID
Passwords Management Methods
We analyzed the security performance of the RFID
password management method, which combined the
phase of an RFID password and the ways in which
the password is associated with a Secure RFID tag
described above, using FTA.
We know that the probability of a successful
falsification of RFID data for resale is low; the RFID
password management method will have a high
security performance. Therefore, let a top event of
FTA be the probability that the RFID data of a
shoplifted book will be falsified, and resale of the
book will be successful in one month. Moreover, it
is necessary to decipher the RFID password of the
Secure RFID tag so that someone may falsify the
RFID data. There are two effective attacks for
deciphering an RFID password. The first is that
someone illegally uses a common interrogator and
hacks into the Secure RFID tag like brute force
attack. The second attack is that someone steals and
illegally uses the handy interrogator of the bookstore.
The FTA is shown in Figure 4. The probability of
each event of FTA is explained below.
(B-11): This event is the probability of falsifying the
RFID data of a bookstore using the RFID
password stolen at another bookstore. In the
existing RFID password management method,
this probability P
B-11
is 100% because an
RFID password is identical at all the
bookstores. In the proposed RFID password
management method, this probability P
B-11
is
0% because the RFID passwords at least differ
for each bookstore.
(B-12): This event is the probability that an RFID
password will be decoded in one month by
hacking into a Secure RFID tag. This
probability P
B-12
was obtained from the
following expression.
)
%1.41
12
=
−
TimeEmonthP
B
(1)
E (Time) is an expected time spent on the
hacking attack. The time that a Secure RFID
tag is checked whether one password is right
using one interrogator is assumed to be about
30 milliseconds and the length of the Secure
RFID password is assumed to be 32 bits
according to the specification of Secure RFID.
(B-2): This event is the probability of falsifying
sales data on a Secure RFID tag in one month
using a common interrogator. This probability
depends on the number of books that can be
falsified using a decoded RFID password.
This probability P
B-2
is 100% in the case of the
existing method or “(1) each bookstore”
because all RFID passwords in the bookstore
are the same. In the case of “(2) each
interrogator”, this probability P
B-2
is 33%
when there are three interrogators for
inspection is three. In the case of “(3) each
interrogator and arrival”, this probability P
B-2
was obtained by the following expression.
%271
2
=
−
BNABNINP
B
,
(2)
where IN denotes the number of the
interrogators for inspection, ABN denotes the
number of applicable stocked books, and BN
denotes the number of stocked books. The
applicable stocked book means the books that
remain unsold for one month because the
RFID PASSWORD MANAGEMENT METHODS FOR FALSIFICATION PREVENTION IN BOOKSTORE
MANAGEMENT USING SECURE RFID TAGS
451