Information technology — Automatic identification and data capture techniques — Part 1: Air interface for security services and file management for RFID architecture

ISO/IEC 29167-1:2012 defines the architecture for security and file management for the ISO/IEC 18000 air interface standards for radio frequency identification (RFID) devices. It provides a common technical specification for security and file management for RFID devices that can be used by ISO committees developing RFID application standards. ISO/IEC 29167-1:2012 specifies architecture for untraceability, security services, and file management as a further optional extension of the air interface. Both security and file management are defined in alignment with existing air interfaces and ISO/IEC 29167-1:2012 only covers extensions on security and file management beyond the scope of the ISO/IEC 18000 air interfaces. ISO/IEC 29167-1:2012 defines various security features called security mechanisms that can be implemented by a tag depending on the application. A tag can support one, a subset, or all of the specified security mechanisms. For an interrogator it is possible to get information about the security mechanisms that are actually implemented and supported by a tag. Moreover, it has been considered that adding new security mechanisms remains possible. Besides signaling the presence of certain security services, further details of the mechanisms such as utilized encryption algorithm and key length also need to be specified and accessible.

Technologies de l'information — Techniques automatiques d'identification et de capture de données — Partie 1: Interface d'air pour services de sécurité et gestion des fichiers pour architecture RFID

General Information

Status
Withdrawn
Publication Date
04-Mar-2012
Withdrawal Date
04-Mar-2012
Current Stage
9599 - Withdrawal of International Standard
Completion Date
06-Aug-2014
Ref Project

Relations

Buy Standard

Standard
ISO/IEC 29167-1:2012 - Information technology -- Automatic identification and data capture techniques
English language
7 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC
STANDARD 29167-1
First edition
2012-03-01

Information technology — Automatic
identification and data capture
techniques —
Part 1:
Air interface for security services and file
management for RFID architecture
Technologies de l'information — Techniques automatiques
d'identification et de capture de données —
Partie 1: Interface d'air pour services de sécurité et gestion des fichiers
pour architecture RFID




Reference number
ISO/IEC 29167-1:2012(E)
©
ISO/IEC 2012

---------------------- Page: 1 ----------------------
ISO/IEC 29167-1:2012(E)

COPYRIGHT PROTECTED DOCUMENT


©  ISO/IEC 2012
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56  CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland

ii © ISO/IEC 2012 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 29167-1:2012(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 29167-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 31, Automatic identification and data capture techniques.
ISO/IEC 29167 consists of the following parts, under the general title Information technology — Automatic
identification and data capture techniques:
 Part 1: Air interface for security services and file management for RFID architecture

© ISO/IEC 2012 – All rights reserved iii

---------------------- Page: 3 ----------------------
ISO/IEC 29167-1:2012(E)
Introduction
ISO/IEC 29167 describes file management and security as applicable for ISO/IEC 18000. ISO/IEC 29167 is
an optional extension to the ISO/IEC 18000 air interfaces.
The ISO/IEC 18000 series of International Standards on radio frequency identification (RFID) for item
management does not offer strong security of the tag and interrogator data and identity. For example, the
unique item identifiers (UII) of tags are typically transmitted to every other device in the RF field and can thus
be easily tracked. Additionally, sensitive data such as passwords are typically transmitted over RF without
encryption and can easily be intercepted. Moreover, utilized passwords may be short in length.
ISO/IEC 29167 fulfils the need for applications requiring effective security in the handling of sensitive
information including the unauthorized interception and tracking of data and devices.
ISO/IEC 29167 covers the air interface for interrogators and tags that have security mechanisms and/or file
management on board. ISO/IEC 29167 only applies to tags that perform the computations that are required
for the security and file management mechanisms. Tag to tag communication is not excluded.

iv © ISO/IEC 2012 – All rights reserved

---------------------- Page: 4 ----------------------
INTERNATIONAL STANDARD ISO/IEC 29167-1:2012(E)

Information technology — Automatic identification and data
capture techniques —
Part 1:
Air interface for security services and file management for RFID
architecture
1 Scope
This part of ISO/IEC 29167 defines the architecture for security and file management for the ISO/IEC 18000
air interface standards for radio frequency identification (RFID) devices. It provides a common technical
specification for security and file management for RFID devices that can be used by ISO committees
developing RFID application standards.
This part of ISO/IEC 29167 specifies architecture for
 untraceability,
 security services, and
 file management
as a further optional extension of the air interface. Both security and file management are defined in alignment
with existing air interfaces and this part of ISO/IEC 29167 only covers extensions on security and file
management beyond the scope of the ISO/IEC 18000 air interfaces.
This part of ISO/IEC 29167 defines various security features called security mechanisms that can be
implemented by a tag depending on the application. A tag can support one, a subset, or all of the specified
security mechanisms. For an interrogator it is possible to get information about the security mechanisms that
are actually implemented and supported by a tag. Moreover, it has been considered that adding new security
mechanisms remains possible. Besides signaling the presence of certain security services, further details of
the mechanisms such as utilized encryption algorithm and key length also need to be specified and accessible.
2 Conformance
In general it is assumed that all requirements defined in this part of ISO/IEC 29167 shall be fulfilled.
A tag is compliant to this part of ISO/IEC 29167 if it supports one or more of the security mechanisms or file
management mechanisms as defined in this part of ISO/IEC 29167.
The discovery services are mandatory for interoperability.
© ISO/IEC 2012 – All rights reserved 1

---------------------- Page: 5 ----------------------
ISO/IEC 29167-1:2012(E)
3 Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
ISO/IEC 15962, Information technology — Radio frequency identification (RFID) for item management — Data
protocol: data encoding rules and logical memory functions
ISO/IEC 19762 (all parts), Information technology — Automatic identification and data capture (AIDC)
techniques — Harmonized vocabulary
4 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 19762 (all parts) apply.
5 Safeguarding personal privacy and data
5.1 Motivation
RFID technology enables the processing of data without physical contact or visible interaction between the
interrogator and the tag. The technology can deliver numerous economic and societal benefits.
RFID applications hold the potential to process data relating to an identified or identifiable person who is being
identified directly or indirectly. Furthermore, the potential exists for this technology to be used to monitor an
individual through his/her possession of one or more items that contain a unique RFID item number. This
interaction can happen without the individual concerned being aware of it.
The functionality offered by ISO/IEC 29167 allows RFID applications to ensure privacy, integrity, authenticity
and confidentiality of the data on the tag. This functionality includes organization of data and access control.
ISO/IEC 29167, in combination with ISO/IEC 18000, addresses issues of privacy and security related to the
use of RFID for Item Management. This part of ISO/IEC 29167 provides an overview, while details will be
described in the specific parts of ISO/IEC 29167 in combination with the corresponding parts of
ISO/IEC 18000.
ISO/IEC 29167 extends ISO/IEC 18000 with the following features:
 untraceability;
 authenticity;
 secure access to data and functions.
5.2 Features of this International Standard
The tag features and air interface commands in ISO/IEC 29167 enable the implementation of the following
features in an RFID system:
 Untraceability: by putting the tag in a special mode (called untraceability mode) where the RFID tag hides
all or part of its identity.
 Certify authenticity: by using one or more air interface commands a tag can produce a certificate of
authenticity. Verification of this certificate may require additional features such as key management to be
implemented in the RFID system.
2 © ISO/IEC 2012 – All rights reserved

---------------------- Page: 6 ----------------------
ISO/IEC 29167-1:2012(E)
 Secure access to tag data and functions: data can be organized in files, access to these files and tag
functions can be configured and transmission of the data can be secured.
In addition to these features, the tag also provides the necessary information about the features and air
interface commands it supports.
5.3 Safeguarding personal privacy and data on the tag
Privacy and information security features should be built into the RFID applications before their widespread
1)
use . ISO/IEC 29167 is intended to assist RFID application operators in taking reasonable measures to
achieve 'security and privacy-by-design'. The main properties that need to be protected are:
1) Identity of the tag
The identity of the tag can be protected by the untraceability feature. Untraceability prevents
unauthorized tracking of a tag. Untraceability prevents associating the tag to an identified or
identifiable person.
2) Data on the tag
Access to the data (and other features of the tag) may be protected by verifying the authenticity of
the interrogator. The data on the tag may be organized in files. Access rights may be associated to
each individual file.
3) Communication between the tag and the interrogator
The data that needs to be exchanged between the tag and the interrogator can be overheard by
somebody who intercepts this communication. The integrity and confidentiality of the data may be
protected by cryptographic methods.
5.4 Implications of security
5.4.1 Key management
Use of cryptography requires the management of secrets, sometimes including keys. Management of secrets
increases system complexity.
For example, the secrets should be communicated and stored securely.
Complexity increases with multiple custodians of secrets in the system.
Mechanisms to recover from compromised secrets increases complexity of the system.
CAUTION — Inadequate management of secrets can render an entire supply chain ineffective.
5.4.2 Increased resourc
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.