RFID Security and Privacy. RFID Radio Frequency IDentification Warning: "RFID tag" can mean a lot of things.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Frank Stajano Presented by Patrick Davis 1.  Ubiquitous Computing ◦ Exact concept inception date is unknown ◦ Basically background computing in life.
G53SEC 1 Hardware Security The (slightly) more tactile side of security.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06.
ITEC 810 Overview of Micropayment Technology
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
RFID By Jake Schmitt, Neil McLain, Steve Staten. Overview RFID Defined Defined History History Current Applications Controversy Controversy Testing and.
Security in RFID Presented By… NetSecurity-Spring07
RFID Security and Privacy Part 2: security example.
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
Radio-Frequency Identification (RFID) Andrew Bowdle MD, PhD Professor of Anesthesiology and Pharmaceutics Chief of the Division of Cardiothoracic Anesthesiology.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
RFID Technology and Asset Tracking “Any sufficiently advanced technology is indistinguishable from magic.” Arthur C Clark.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
RFID (Radio Frequency ID). RFID system In a typical RFID system, individual objects are equipped with a small, inexpensive tag. The tag contains a transponder.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
RFID Technology in Healthcare Presenters: Lauren Gunn and Connor Zale.
MICROCHIP IMPLANT NEGATIVE SIDES OF RADIO FREQUENCY IDENTIFICATION CHIPS.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Radio Frequency Identification So What? What is RFID Type of technology that uses electromagnetic radio frequency to identify objects, animals and humans.
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
Applied Communications Technology n.a.shulver, March 2012 updated March 2013 RFID identification 1.What is RFID? 2.Some examples 3.How does it work? 4.Industrial.
Smart Cards By Simon Siu and Russell Doyle Overview Size of a credit card Small embedded computer chip – Memory cards – Processor cards – Electronic.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
NFC - Near Field Communication Technology
RFID’s By Samuel and Sabra. What is an RFID? RFID’s are microchips RFID’s are microchips Antenna emits radio signals to read/write Antenna emits radio.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Smart card security Nora Dabbous Security Technologies Department.
Smart Card Technology & Features
RFID Technology What is it? (And why should you care?)
RFID TECHNOLOGY IN BABARIA INSTITUTE OF TECHNNOLOGY (BIT):an OVERVIEW BY BINAL H JOSHI LIBRARIAN BABARIA INSTITUTE OF TECHNOLOGY VADODARA.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Ignite Presentation: Near Field Communication Harry Yang.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Overall: 9/10. GOODWORK ON  Good information  Very detailed  Nice Introduction  RFID has many similarities with barcoding but with the unique characteristics.
Radio Frequency Identification
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Radio Frequency Identification (RFID)
Introduction Architecture Hardware Software Application Security Logical Attack Physical Attack Side channel Attack.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
CONTACTLESS SMART CARD Betty Yu. What is contactless smart card? A contactless smart card is a contactless MHz credential whose dimensions are credit-card.
Ubiquitous means ‘everywhere’
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
Unit 2 Technology Systems
English for Advance Learners I
What is a Radio-Frequency Identification (RFID) tag?
Radio Frequency Identification (RFID)
Radio Frequency IDentification
Team 7 Technical Presentation
Radio Frequency Identification
Selective Blocking of RFID Tags for Consumer Privacy
Presentation transcript:

RFID Security and Privacy

RFID Radio Frequency IDentification Warning: "RFID tag" can mean a lot of things

Most basic use: replacement of barcode wireless readout no alignment required passive tag - reader provides power through EM field tag contains only ID, no processor very cheap database of tag IDs and their meaning DB T-shirt ## FEEBDAED ##

Peggy Yorkshire Terrier Owner: J. Smith Peggy Yorkshire Terrier Owner: J. Smith Phone: …

What is needed for this? Small identifying tag –can be placed in an animal / object –very cheap –most basic form: almost no logic Contactless readout –reading device provides electromagnetic field –tag gets power from EM field –tag causes time-dependent impedance changes

At the other end of the spectrum: wireless smartcards processor optional: battery active transmitter, not just passive impedance ROM memory -keys -software RAM memory flash / EEPROM -sensitive data supports read & write operations password protection crypto

RFID vs. Traditional smart cards Similar: data on an electronic device Different: power supply and data exchange without galvanic contacts Different: limited power on the card side

Active tagsPassive tags PowerBatterySupplied by the reader Availability of power ContinuousOnly in field of reader Range~100mup to 3-5m, usually less Price>10 euroless than 10 cents Memory1-2Mb0.5-2Kb Size> 2cm*2cm> 0.05mm*0.05mm (without antenna) Active vs passive

Some examples Shanghai public transportation card Passports Dutch library reader’s pass Animal identification Stock identification Car keys Toll payment

Key holderClockPlastic card Nails Small boxLabelPlastic pinRoll of smart labels toys toys connected to PC

Is this an active or a passive tag?

Implications for security… No money/power for –public key crypto -tamper resistance / detection -tamper-resistant clock Multiple readers and millions of tags –tag collision, reader collision anti-collision protocols –synchronisation –lots of different keys Non-contact and non-line-of-sight –hard to physically impede the communication

Implications for privacy Internet Of Things will make this even worse

Implanting RFID in humans? Advantageous for –cancer patients undergoing chemotherapy; –people with pacemakers or other medical implants; –cognitive impairment due to epilepsy, diabetes, or Alzheimer’s disease; –emergency (allergy)… Your favourite drink at the bar?!

2004: The attorney general of Mexico and 18 of his staff had chips implanted to allow them to gain access to certain high-security areas. 2006: President of Colombia agreed to require Colombian citizens to be implanted with RFID chips before they could gain entry into the US for seasonal work. 2008: UK jails considering RFID implants for prisoners : OV Chipkaart security issues in the Netherlands. Security of car locks, wireless payment, etc Impact on society

Things that can go wrong (1) Illicit tracking of RFID tags

Things that can go wrong (2) Skimming (obtain secrets by eavesdropping)

Things that can go wrong (3) Tag cloning

Things that can go wrong (4) Cross contamination

Things that can go wrong (5) Tag killing

Things that can go wrong (6) Tags captured and secret info extracted (invasive and side channel attacks)

Things that can go wrong (7) Jamming Can also be selective

The Pandora's box of RFID Ethical issues Privacy Tracking Skimming Tag cloning Cross-contamination Tag killing Invasive attacks Jamming

Questions ?

Some sources… areas/rfid-privacy-and-security.htm And the “usual suspects”: – –

Suggested topics: choose three sub-topics Applications: banknotes e-Passports anti-counterfeiting public transport car keys Protocols HB + EC-RAC EMAP distance bounding... other protocols Various kinds of attacks & countermeasures Mifare hack RFID viruses / malware Cloning... other attacks Privacy enhancement (universal) re-encryption blocker tag formal privacy verification Crypto on RFID tags PUFs elliptic curves random number generators... other crypto