Light Reading

Malware in the Air?

Light Reading
LR Mobile News Analysis
Light Reading
3/15/2006
50%
50%

For the first time, researchers have raised the possibility of RFID tags being infected by viruses and worms.

In a paper being presented today at the Pervasive Computing and Communications Conference in Pisa, Italy, sponsored by the Institute of Electrical and Electronics Engineers Inc. (IEEE) , a group of computer scientists show just how susceptible radio-frequency tags may be to malware.

"Up until now, everyone working on RFID technology has tacitly assumed that the mere act of scanning an RFID tag cannot modify backend software, and certainly not in a malicious way," the paper's authors write. "Unfortunately, they are wrong."

Under certain conditions, they say, RFID tags can be intentionally infected with viruses that can then find their way into the backend databases used by the RFID software.

As RFID spreads from retail supply-chain applications to a host of uses in logistics, warehousing, and other businesses, the specter of viruses spread from tiny tags via handheld scanners into enterprise software platforms could significantly slow the technology's spread. (See DHL Chips in on RFID.)

Today's presentation in Pisa provides details on how to spread viruses via RFID as well as how to defend against them. The paper is being published, the authors, say, to warn the designers and users of RFID not to deploy vulnerable systems.

"By making code for RFID 'malware' publicly available, we hope to convince them that the problem is serious and had better be dealt with, and fast," said author Andrew Tanenbaum and his colleagues, in a statement.

"Viruses on RFID tags present two issues," comments David Adams, senior vice president for corporate strategy and technology at Denver-based Trenstar, which manages thousands of beer kegs in the United Kingdom using RFID tags. "How to protect the flow of information on the tag itself and how to prevent any virus from making from the tag to our application level that is fed from the RFID network." (See Brewers Tap Into RFID.)

Trenstar, Adams adds, has created a proprietary data structure for information, which searches for corrupted data at each stage in the supply chain where the tags are scanned. The company also analyzes all data flowing into its application layer for known viruses, including RFID-generated data.

"Any good data collection system has to be set up so that it's very specific in what sort of data it's looking to collect," adds Dan Mullen, executive director of AIM Global, a trade association for the barcode and RFID industries. "That's just good practice, and it's been around for a long time."

The paper outlines three scenarios: a prankster who replaces an RFID tag on a jar of peanut butter with an infected tag to infect a supermarket chain's database; a subdermal (i.e., under-the-skin) RFID tag on a pet used to upload a virus into a veterinarian or ASPCA computer system; and, most alarmingly, a radio-frequency bag tag used to infect an airport baggage-handling system. A virus in an airport database could re-infect other bags as they are scanned, which in turn could spread the virus to hub airports as the traveler changes planes.

"Within a day, hundreds of airport databases all over the world could be infected," the authors write. "Merely infecting other tags is the most benign case. An RFID virus could also carry a payload that did other damage to the database -- for example, helping drug smugglers or terrorists hide their baggage from airline and government officials."

The broadness of the authors' claims, however, betrays a lack of understanding of how specific RFID systems are designed, says Mullen.

"If you're looking at an airport baggage system, for instance, you have to know what sort of tag's being used, the structure of the data being collected, and what the scanners are set up to gather," he explains. "Look at it in a vertical application fashion to see what specific concerns might be present there."

A renowned computer scientist, Tanenbaum developed the Minix operating system, a precursor to Linux.

— Richard Martin, Senior Editor, Unstrung

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Flash Poll
From The Founder
It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
LRTV Huawei Video Resource Center
Interview With Rick Talbot, Principal Analyst, Current Analysis

10|31|14   |   2:12   |   (0) comments


At the NFV Open Cloud Forum 2014, Rick Talbot shared his positive feedback about the holistic and open approach that Huawei adopts for SDN and NFV. He also found the open sharing at the event valuable as it features different perspectives from Huawei experts, telecom operators, industry analysts as well as security experts.
LRTV Huawei Video Resource Center
Interview With David Snow, Principal Analyst, Current Analysis

10|31|14   |   2:24   |   (0) comments


David Snow talked about his understanding of Huawei and its SoftCOM strategy at the NFV Open Cloud Forum 2014, saying that Huawei's wide approach combining IT and CT expertise, introducing big data and analytics into solutions and contributing to the OpenStack community particularly resonate with him and make the company stand out in the industry.
LRTV Huawei Video Resource Center
Interview With Roz Roseboro, Senior Analyst, Heavy Reading

10|31|14   |   3:13   |   (0) comments


Roz Roseboro commented on Huawei's data center capabilities and NFV solutions at the NFV Open Cloud Forum 2014, saying that in addition to covering all three key domains of compute, storage and networking, the company also emphasizes the importance of management capabilities and professional services, which are essential in making NFV a reality.
LRTV Huawei Video Resource Center
Interview With Michael Howard, Co-founder & Principal Analyst, Infonetics Research

10|31|14   |   5:25   |   (0) comments


Michael Howard talked about SDN, NFV, and OpenStack adoption at Huawei's NFV Open Cloud Forum 2014. Particularly, he pointed out that Virtual Enterprise CPE is the top NFV use case that operators plan to invest in over 2014 and 2015 to deliver new enterprise services through virtualized functions.
LRTV Huawei Video Resource Center
Interview With Jerry Caron, Senior Vice President, Current Analysis

10|31|14   |   3:11   |   (0) comments


At Huawei's NFV Open Cloud Forum 2014, Jerry Caron from Current Analysis said that orchestration and management are key to realizing SDN and NFV for global carriers, and the approach that Huawei is taking, with its FusionSphere Cloud OS at the core, is in the right direction to address the challenges.
LRTV Documentaries
Broadband Battles

10|31|14   |   01:39   |   (0) comments


This year's Broadband World Forum featured a number of show floor battles focused on access gear, components and coffee.
Jonestown
Mobile Backhaul: Going to the Dark Side?

10|30|14   |   2:26   |   (1) comment


Heavy Reading's Patrick Donegan shares his view on a dark trend that bubbled up at Light Reading's annual backhaul conference in NYC.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With CEO of SwitchCom

10|30|14   |   4:13   |   (0) comments


SwitchCom, an IT company based in Angola, recommends a variety of Huawei solutions and hardware to their customers in the energy industry.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With Ethiopia's Ministry of Water Irrigation & Energy

10|30|14   |   4:08   |   (0) comments


Gosaye Mengistie of Ethiopia's Ministry of Water Irrigation & Energy discusses the collaboration with Huawei in that country.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview with Dongfang Electronics Corporation

10|30|14   |   5:46   |   (0) comments


Dongfang Electronics Corporation, headquartered in Chengdu, China, is one of China's largest manufacturers of power generators and contractors of power station projects.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview with Zimbabwe's Customers

10|30|14   |   3:31   |   (0) comments


Representatives of Zimbabwe's Ministry of Power and Development discuss the energy needs of their country as well as new areas of improvement due to enhanced ICT capabilities.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With Colbún Chile

10|30|14   |   4:29   |   (0) comments


In Chile, an aging energy infrastructure was in dire need of a modern update. Claudio Valenzuela of Colbún discusses how Huawei's ICT solutions continue to provide crucial information to improve the grid and how an in-country engineer is a cricial asset.
Upcoming Live Events
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 2, 2014, New York City
December 3, 2014, New York City
December 9-10, 2014, Reykjavik, Iceland
February 10, 2015, Atlanta, GA
May 6, 2015, McCormick Convention Center, Chicago, IL
May 30, 2015, The Westin Peachtree, Atlanta, GA
June 9-10, 2015, Chicago, IL
Infographics
WhoIsHostingThis.com presents six of the world's most extreme WiFi hotspots, enabling the most epic selfies you can imagine.
Hot Topics
Microsoft's Skype Embraces WebRTC on IE
Sarah Reedy, Senior Editor, 10/27/2014
FTC Slaps AT&T With Throttling Lawsuit
Sarah Reedy, Senior Editor, 10/28/2014
Wheeler Gets Down With OTT
Mari Silbey, Independent Technology Editor, 10/29/2014
China's MVNOs Hit the Wall
Robert Clark, 10/27/2014
Let's Not Kill SDN & NFV With Silos
Francois Locoh-Donou, Senior VP, Global Products Group, Ciena, 10/28/2014
Like Us on Facebook
Twitter Feed