563.9.2 RFID Security & Privacy Matt Hansen University of Illinois Fall 2007.

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

SMUCSE 7349 RFID Security. SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War.
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Technical Issues Regarding Near Field Communication Group 16 Tyler Swofford Matthew Kotan.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
RFID Systems and Security and Privacy Implications Sanjay E. Sarma Stephen A. Weis Daniel W. Engels Auto-ID Center Massachusetts Institute of Technology.
Ruhr University Bochum Cryptography in Heavily Constraint Environments Christof Paar EUROBITS Center for IT Security COmmunication SecuritY (COSY) Group.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
RFID Radio Frequency IDentification By Özcan Tunalılar 27 th March 2008.
ITEC 810 Overview of Micropayment Technology
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Slide 1 Vitaly Shmatikov CS 378 RFID Security and Privacy.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
Security in RFID Presented By… NetSecurity-Spring07
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Topic 3: Sensor Networks and RFIDs Part 3 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
Slide 1 Vitaly Shmatikov CS 378 RFID Security and Privacy.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
Wireless Sensor Network Security Anuj Nagar CS 590.
RFID Cardinality Estimation with Blocker Tags
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID Cow Jewelry – or – Revolution Travis Sparks
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
IWD2243 Wireless & Mobile Security
SECURE SYMMETRIC AUTHENTICATION FOR RFID TAGS
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories.
1 Ch. 17: Security of RFID slide 1. 2 Roles of RFID applications slide 2 TagsReaderServer(Database) Secure channel Slides modified from presentation by.
Network Security - IT653 Deepti Agrawal KReSIT, IIT Bombay
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
1 RFID Technology and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
RFID Technology: When innovation brings along data protection challenges Eleni Kosta ICRI – K.U.Leuven.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels, Ronald Rivest, and Michael Szydlo ACM CCS, October 2003 Presented by Himanshu.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
1 RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Azam Supervisor : Prof. Raj Jain
RFID SECURITY.
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Security of the Internet of Things: perspectives and challenges
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
What is a Radio-Frequency Identification (RFID) tag?
Team 7 Technical Presentation
Revisting Unpredictability-Based RFID Privacy Models
Randomized PRF Tree Walking Algorithm for Secure RFID
Selective Blocking of RFID Tags for Consumer Privacy
- Dylan Leintz - Dr. Davies
Mobile Computing Lecture Materials By Bintang Eka Putera.
RFID used for real-time tracking Physics 490 seminar 4/15/2019
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

RFID Security & Privacy Matt Hansen University of Illinois Fall 2007

2 Outline RFID Overview –Tags, Readers, and Applications –Tag Singulation Security & Privacy Threats Proposed Solutions Public Concerns 2

3 RFID Overview Tags (transponders) Attached to objects, “call out” identifying data on a special radio frequency 02.3DFEX4.78AF51 EasyToll card #816 Reader (transceiver) Reads data off the tags without direct contact Radio signal (contactless) Range: from 3-5 inches to 3 yards Database Matches tag IDs to physical objects Shmatikov 05

4 Tag Types Passive: –All power comes from a reader’s signal –Tags are inactive unless a reader activates them –Cheaper and smaller, but shorter range Semi-passive –On-board battery, but cannot initiate communication –Can serve as sensors, collect information from environment: for example, “smart dust” for military applications Active: –On-board battery power –Can record sensor readings or perform calculations in the absence of a reader –Longer read range LFHFUHFMicrowave Freq. Range KHz13.56 MHz MHz GHz Read Range10 cm1M2-7 M1M ApplicationSmart Cards, Ticketing, animal tagging, Access Control Small item management, supply chain, Anti-theft, library, transportation Transportation vehicle ID, Access/Security, large item management, supply chain Transportation vehicle ID (tolls), Access/Security, large item management, supply chain Fong 05

5 Security Challenge Low cost RFID tags have very limited resources –Typically have only 500-5,000 gates –May have up to a few hundred bits of storage –Tags cannot perform complex computations Most tags simply emit a static identifier when prompted Tags do not have the resources to allow for public-key or symmetric-key encryption systems EPC tags: $0.05, 250 – 1000 gates AES requires 20,000 – 30,000 gates Fong 05

6 Applications Supply-chain management –logistics, inventory control, retail check-out Payment systems –ExxonMobil SpeedPass –I-Pass/EZ-Pass toll systems –Credit Cards Access Control –Passports Library books Animal Tracking Fong 05

7 Reading Tags The read process starts when an RFID reader sends out a query message –Invites all tags within range to respond –More than one RFID tag may respond at the same time Tags cannot generally hear one another This causes a collision –Reader cannot accurately read information from more than one tag at a time Reader must engage in a special singulation protocol to talk to each tag separately Shmatikov 05

8 Singulation Algorithms Deterministic –Binary tree-walking scheme Reader sorts through tags based on tag ID Reader performs a depth-first search of the tag ID space Probabilistic –Slotted Aloha scheme Time is divided into discrete intervals Tags respond in randomly generated times Process does not depend on tag ID Sarma, Weis, Engels 02

9 Tree Walking Every tag has a k-bit identifier prefix=0 prefix=00prefix=01 prefix=10prefix=11 prefix=1 Reader broadcasts current prefix Each tag with this prefix responds with its next bit If responses don’t collide, reader adds 1 bit to current prefix, otherwise tries both possibilities This takes O(k  number of tags) Shmatikov 05

10 Threats ReaderTagEavesdropper Forward Channel Range (~100m) Backward Channel Range (~5m) Anti-collision scheme Fong 05 Eavesdropping

11 Threats Tracking –Unauthorized use of a tag’s ID in order to gain information about the location of a person or object –In a retail environment, a user can be associated with an item at purchase time Cloning/Replay –Tags that emit static identifiers are very vulnerable –A thief could replace/rewrite a tag on an expensive item Denial-of-service –Conflicting RF signals can prevent legitimate tag communication Physical attacks –Probing a tag to determine private data Fong 05

12 Security Goals Tags should not compromise privacy of holders –Information should not be leaked to unauthorized readers –Should not be possible to build long-term tracking associations Holders should be able to detect and disable tags they carry Private tag contents should be protected by access control and encryption Spoofing tags or readers should be difficult Sarma, Weis, Engels 02

13 Potential Solutions Disable tags permanently –Kill bit/sleeping –Blocker/privacy tag Prevent tags from being read –Shielding –Jamming Prevent unauthorized parties from listening to tag communication –Cryptography –Distance/Power Level measurements Enact laws governing RFID use –Policy and Legislation

14 Kill bit, Shielding, and Jamming Kill tag after purchase –Special command permanently de-activates tag after the product is purchased –Disables many futuristic applications –Alternative: set tag to “sleep” Shielding - Faraday cage –Container made of foil or metal mesh, impenetrable by radio signals of certain frequencies Shoplifters are already known to use foil-lined bags –Maybe works for a wallet, but huge hassle in general Active jamming –Disables all RFID, including legitimate applications Shmatikov 05

15 Blocker Tag A form of jamming: broadcast both “0” and “1” in response to any request from an RFID reader –Guarantees collision no matter what tags are present –To talk to a tag, reader must traverse every tree path With 128-bit IDs, reader must try values Privacy tag – a special case of the blocker tag –Blocks reading of protected tags, but does not disrupt normal RFID communication –Blocks only certain ID ranges and prevents illegitimate blocking –E.g., blocker tag blocks all IDs with first bit=1 Items on supermarket shelves have first bit=0 Can’t block tags on unpurchased items (anti-shoplifting) After purchase, flip first bit on the tag from 0 to 1 Juels, Rivest, Szydlo 03; Shmatikov 05

16 More Possible Security Measures Distance/Power Level measurements –Majority of hostile reads occur when attacker is physically distant –Signal strength measurements and noise analysis can be used to estimate distance to the reader Cryptography –Required hardware not feasible on low-cost tags –Other methods use one-way hash functions and pseudo-random number generation Physical Protection –A combination of means (security cameras, sensors, etc.) to prevent tampering of RFID devices Policy and Legislation –Legal requirements on RFID use –Does not prevent attackers from unauthorized use Fishkin, Roy, Jiang 04

17 Public Privacy Concerns Tracking –Libraries, retail, auto –Even if unique serial numbers are disabled at purchase time, tracking is still possible by associating “constellations” of tags –“Intelligent” theft –Human Tagging Baja Beach Club, Spain RFID Watchdog Groups –CASPIAN - (Consumers Against Supermarket Privacy Invasion and Numbering) –Spychips.com –Electronic Privacy Information Center Consumer Backlash –Gillette Razors –Benetton Clothing Shmatikov 05

18 References & Recommended Readings Papers: K. P. Fishkin, S. Roy, and B. Jiang, Some Methods for Privacy in RFID Communication, In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), A. Juels, RFID Security and Privacy: A Research Survey, Condensed version to appear in 2006 in the IEEE Journal on Selected Areas in Communication, A. Juels, R. L. Rivest, and M. Szydlo, The Blocker Tag: Selective Blocking of RFIDTags for Consumer Privacy, 8th ACM Conference on Computer and Communications Security, pp , ACM Press, S. Sarma, S. Weis, and D. Engels, RFID Systems and Security and Privacy Implications, Workshop on Cryptographic Hardware and Embedded Systems, S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, Security in Pervasive Computing, Presentations: Vitaly Shmatikov, RFID Security and Privacy, University of Texas Lecture, Kenny Fong, RFID Security, Southern Illinois University Lecture,