RFID SECURITY.

Slides:



Advertisements
Similar presentations
SMUCSE 7349 RFID Security. SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War.
Advertisements

1 Security in Wireless Protocols Bluetooth, , ZigBee.
Queensland University of Technology CRICOS No J Mitigating Sandwich Attacks against a Secure Key Management in WSNs for PCS/SCADA Hani Alzaid, DongGook.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Slide 1 Vitaly Shmatikov CS 378 RFID Security and Privacy.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Security in RFID Presented By… NetSecurity-Spring07
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Slide 1 Vitaly Shmatikov CS 378 RFID Security and Privacy.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
YA-TRAP: Yet Another Trivial RFID Authentication Protocol Gene Tsudik International Conference on Pervasive Computing and Communications, PerCom 2006.
RFID Cardinality Estimation with Blocker Tags
RFID Security & Privacy Matt Hansen University of Illinois Fall 2007.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
1 Cryptographically Strong Pseudorandom Functions and Their Applications 陳昱升 碩士學位論文 中興大學 資訊科學系 2006 年 6 月.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
R R FID Authentication : M inimizing Tag Computation CHES2006 Rump Session, Yokohama. Japan Ph.D. Jin Kwak Kyushu University, JAPAN
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Zac Chupka Jeff Signore.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
SECURE SYMMETRIC AUTHENTICATION FOR RFID TAGS
- 1 - Secure and Serverless RFID Authentication and Search Protocols Chiu C. Tan, Bo Sheng, and Qun Li IEEE Transactions on Wireless Communication APRIL.
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
RFID Inventory Management And Tracking System Greg McDaniel Hashem Garner Adam Kesner Thomas Harris.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Network Security - IT653 Deepti Agrawal KReSIT, IIT Bombay
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
EPCglobal Network Security: Research Challenges and Solutions Yingjiu Li Assistant Professor School of Information Systems Singapore Management University.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia.
Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions Shaoying Cai 1 Yingjiu Li 1 Tieyan Li 2 Robert H. Deng 1 1 Singapore.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels, Ronald Rivest, and Michael Szydlo ACM CCS, October 2003 Presented by Himanshu.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
RFID Technology Lecture for week 5 Dhruba Sen
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
What is a Radio-Frequency Identification (RFID) tag?
Changshe Ma, Yingjiu Li, Robert Deng, Tieyan Li
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
Team 7 Technical Presentation
Revisting Unpredictability-Based RFID Privacy Models
Radio-Frequency Identification (RFID)
Security and Privacy in Pervasive/Ubiquitous Computing Systems
Randomized PRF Tree Walking Algorithm for Secure RFID
An Improved Novel Key Management Protocol for RFID Systems
Presentation transcript:

RFID SECURITY

How Does RFID Work? Tags (transponders) Reader (transceiver) Database 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from 3-5 inches to 3 yards Tags (transponders) Attached to objects, call out their (unique) name and/or static data on a special radio frequency Reader (transceiver) Reads data off the tags without direct contact Database Matches tag IDs to physical objects

Asymmetric channels Range of Reader (Forward Channel) ~100 m TAG EAVESDROPPER ~5 m Tag’s Range (Backward Channel)

Applications Tracking/Identification Library Books Children Pets Auto Parts Inventory management in a Supply Chain Contactless Smart Cards

A Generic Supply Chain Retailers Wholesalers Manufacturers Suppliers Manufacturers Wholesalers Retailers goods, invoices Purchase orders, payments Supply web (retail customers not shown)

Key Decisions When to order How much to order From whom to order As order quantity increases, holding cost increases As order quantity decreases, stockout cost increases From whom to order

The Problem - Motivation Basic problem with RFID tags Can be remotely scanned Respond to query by any reader This leads to security and privacy risk Resource constraints Limited power and computing resources Hence classical cryptographic mechanisms not feasible The RFID security challenge How to obtain maximum security with almost no resources?

The Problems of Privacy and Security RFID privacy concerns the problem of misbehaving readers harvesting information from well-behaving tags. Risks : Leakage of personal information (prescriptions, brand/size of clothes etc.). Location privacy: Tracking the physical location of individuals by their RFID tags. RFID authentication concerns the problem of well behaving readers receiving information from misbehaving tags, particularly counterfeit ones. Risks: Forgery Sabotage

Cost and capability The strength and flavor of proposed security solutions will depend on the allowed tag cost for different applications 50+ cent tags. Low-end tags will be 10 cent, 5 cent and 2 cent in about 5 years

Challenge Tens of research ideas have been proposed in the past two years Propose improvements over the existing privacy enhancing protocols for the extremely resource constrained RFID systems

Security Attacks Spoofing Denial of Service Man in the middle attack Imitating the behavior of a genuine tag Denial of Service Man in the middle attack Modify the response of the tag to the reader or vice versa Replay Attack Eavesdrop message from the tag (reader) & re-transmit the message to the legitimate reader (tag). Traffic Analysis Monitoring of comm. between reader & tag allows adversary to perform traffic analysis & generate statistical data.

Security and Privacy Requirements Anonymity Tag output should not give idea about ID Untraceability Tag output should be varying Indistinguishibility Tag output should be truly random, i.e. variation should not be predictable Forward Security Adversary should not be able to associate the current output with past output Mutual Authentication Tag-to-reader and reader-to-tag authentication

Backend Requirements Efficiency and scalability Flexibility Order of computation/precomputation required as a function of number of tags Flexibility Changes required with addition/removal of tags

Hash Lock Reader RFID tag Goal: Authenticate reader to the RFID tag [Rivest, Weis, Sharma, Engels] Goal: Authenticate reader to the RFID tag Reader “Who are you?” RFID tag metaID key Compute hash(key) and compare with stored metaID “My real ID is…” Stores metaID=hash(key) Stores key; hash(key) for any tag Unique key for each tag

Hash Lock Analysis PROS CONS Relatively cheap to implement : Tag has to store hash function implementation and metaID Security based on weak collision-resistance of hash function Scalable due to low key look-up overhead CONS Constant tag output – enables traceability Motivates Randomization Too many messages/rounds Requires reader to know all keys

Randomized Hash Lock Reader RFID tag [Weis et al.] Goal: Authenticate reader to the RFID tag Reader RFID tag “Who are you?” Generate random R R, hash(R,IDk) Compute hash(R,IDi) for every known IDi and compare “You must be IDk” Stores its own IDk Stores all IDs: ID1, … ,IDn

Randomized Hash Lock Analysis PROS Randomized response prevents tracking Tag needs to store hash implementation and pseudo-random number generator CONS Inefficient brute force key look-up No Forward security Motivates updating tag ID on each read Security Flaw - Adversary can impersonate tag by learning a valid tag response.

OSK Scheme [Ohkubo, Suzuki and Kinoshita] Goal: Enable reader to identify the RFID tag, change tag identifier on each read Database Reader Tag Query Ai=G(Si) Ai=G(Si) Compute Hash Chain Si+1=H(Si) Tag ID

OSK Analysis Motivates reducing computation time at reader/backend PROS Different random like values on every read operation prevents tracking Forward Security ensured due to one way hash property Tag needs to store only 2 hash implementations, hence low cost Minimal number of transmissions CONS Not scalable for large scale applications due to brute force search Motivates reducing computation time at reader/backend Susceptible to DoS attacks May lead to problem due to hash collisions.

Summary RFIDs have many useful applications related to tracking and identification But there are some important issues of security and privacy Small number of gates for S/P makes the design of such protocols challenging Tens of schemes proposed for security/privacy but subtle drawbacks with many of them. Much more work needed in this area