EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond

EPC (Electronic Product Code) tags are industry-standard RFID devices poised to supplant optical barcodes in many applications. We explore the systemic risks and challenges created by the increasingly common use of EPC for security applications. As a central case study, we examine the recently issued United States Passport Card and Washington State "enhanced drivers license" (WA EDL), both of which incorporate Gen-2 EPC tags. We measure multiple weaknesses, including susceptibility to cloning, extended read ranges, and the ability to remotely kill a WA EDL. We study the implications of these vulnerabilities to overall system security, and offer suggestions for improvement. We demonstrate anti-cloning techniques for off-the-shelf EPC tags, overcoming practical challenges in a previous proposal to co-opt the EPC "kill" command to achieve tag authentication. Our paper fills a vacuum of experimentally grounded evaluation of and guidance for security applications for EPC tags not just in identity documents, but more broadly in the authentication of objects and people.

[1]  Andrew S. Tanenbaum,et al.  A Platform for RFID Security and Privacy Administration (Awarded Best Paper!) , 2006, LISA.

[2]  A. Juels,et al.  The Security Implications of VeriChip Cloning , 2006 .

[3]  Jennifer King,et al.  Where's The Beep? Security, Privacy, and User Misunderstandings of RFID , 2008, UPSEC.

[4]  R. Nickerson Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .

[5]  Marco Gruteser,et al.  A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks , 2003, SPC.

[6]  M. Allen,et al.  A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns , 2000, Health education & behavior : the official publication of the Society for Public Health Education.

[7]  Eugene Borgida,et al.  The Differential Impact of Abstract vs. Concrete Information on Decisions , 1977 .

[8]  Ari Juels Strengthening EPC tags against cloning , 2005, WiSe '05.

[9]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[11]  N D Weinstein,et al.  Perceived probability, perceived severity, and health-protective behavior. , 2000, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[12]  David Evans,et al.  Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.

[13]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[14]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[15]  Alanson P. Sample,et al.  A Wirelessly-Powered Platform for Sensing and Computation , 2006, UbiComp.

[16]  Mani Mina,et al.  Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.

[17]  Steven J. Sherman,et al.  Social explanation: The role of timing, set, and recall on subjective likelihood estimates. , 1983 .

[18]  Flavio D. Garcia,et al.  Wirelessly Pickpocketing a Mifare Classic Card , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[19]  Kevin Fu,et al.  Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.

[20]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.

[21]  Ari Juels,et al.  Technology Evaluation: The Security Implications of VeriChip Cloning , 2006, J. Am. Medical Informatics Assoc..

[22]  Kathleen L. Mosier,et al.  Does automation bias decision-making? , 1999, Int. J. Hum. Comput. Stud..

[23]  Raja Parasuraman,et al.  The role of memory representation in the vigilance decrement , 2004, Psychonomic bulletin & review.

[24]  Tadayoshi Kohno,et al.  Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing , 2007, USENIX Security Symposium.

[25]  Matthew Green,et al.  Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.

[26]  Tadayoshi Kohno,et al.  EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond , 2008 .

[27]  S. Breznitz Cry Wolf: The Psychology of False Alarms , 1984 .