Made Harta Dwijaksara Park, Yi Jae

Slides:



Advertisements
Similar presentations
Pharmacology and the Nursing Process in LPN Practice
Advertisements

GSA Pizza Talk - EPFL - Capillary routing with FEC by E. Gabrielyan 1 Capillary Multi-Path Routing for reliable Real-Time Streaming with FEC.
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
June 27, 2005 Preparing your Implementation Plan.
Computer Networks TCP/IP Protocol Suite.
Virtual Trunk Protocol
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Document #07-2I RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) (mod 7/25 & clean-up 8/20) Customer Supplier.
1 Introducing the Specifications of the Metro Ethernet Forum MEF 19 Abstract Test Suite for UNI Type 1 February 2008.
Smart Tracking: Usage of IPv6 in RFID System for Global Mobility
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Multiplying binomials You will have 20 seconds to answer each of the following multiplication problems. If you get hung up, go to the next problem when.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
Year 6 mental test 5 second questions
Toward Practical Public Key Anti- Counterfeiting for Low-Cost EPC Tags Alex Arbit, Avishai Wool, Yossi Oren, IEEE RFID April
1 Scanshell.Net CSSN – Card Scanning Solutions THE ULTIMATE, ALL-IN-ONE CARD-SCANNING SOLUTION.
Addison Wesley is an imprint of © 2010 Pearson Addison-Wesley. All rights reserved. Chapter 10 Arrays and Tile Mapping Starting Out with Games & Graphics.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Effectively applying ISO9001:2000 clauses 6 and 7.
1. Documents types Visas (ID-2) ICAO standard passports (ID-3) ID cards and driving licences (ID-1) Travel and identity documents.
KONNEX Scientific Conference, 5th October 2004 KONNEX Configuration modes 1 KONNEX Configuration modes in the frame of a modular communication stack Petar.
Data Structures Using C++
ABC Technology Project
By Waqas Over the many years the people have studied software-development approaches to figure out which approaches are quickest, cheapest, most.
Software Testing and Quality Assurance
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
VOORBLAD.
New-Product Development and Product Life-Cycle Strategies
Squares and Square Root WALK. Solve each problem REVIEW:
Defect Tolerance for Yield Enhancement of FPGA Interconnect Using Fine-grain and Coarse-grain Redundancy Anthony J. YuGuy G.F. Lemieux September 15, 2005.
© 2012 National Heart Foundation of Australia. Slide 2.
Adobe InDesign CS5 - Illustrated Unit F: Working with Layers
Chapter 5 Test Review Sections 5-1 through 5-4.
SIMOCODE-DP Software.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
Week 1.
We will resume in: 25 Minutes.
PSSA Preparation.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
Excel Lesson 16 Protecting, Tracking, and Sharing Workbooks Microsoft Office 2010 Advanced Cable / Morrison 1.
Introduction into Simulation Basic Simulation Modeling.
Where Are You From? Confusing Location Distinction Using Virtual Multipath Camouflage Song Fang, Yao Liu Wenbo Shen, Haojin Zhu 1.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Risk of Using RFID chips in Passports Oscar Mendez.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers.
Preventative Measures
Presented By:- Siva Prasad Reddy Nooli
Karl Koscher University of Washington Seattle, Washington, USA
Presentation transcript:

Made Harta Dwijaksara Park, Yi Jae EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond Made Harta Dwijaksara Park, Yi Jae

Contents Introduction Experimental Evaluation of Passport Card and EDLs Defensive Directions: Backward Compatible Cloning Defense Co-opting KILL Co-opting ACCESS Advantage and Limitation Experiments with and Extensions to KILL-Based Authentication Conclusion

Introduction Explore the systemic risks and challenges created by the increasingly common use of EPC for security applications Implications of vulnerabilities to overall system security Suggestions for improvement Anti-cloning techniques for off-the-shelf EPC tags

Introduction EPC (Electronic Product Code) Tag Industry-standard RFID devices Supplant optical barcodes Identify each item manufactured Low cost and Relatively Long read range Class-1 Gen-2 tag EPC: Creation of Auto-ID Labs, currently managed by EPCglobal

Introduction Passport Card & EDL EPC tags are now seeing a landmark deployment in the U.S. in identity documents used at national border crossings Passport Card, EDL

Introduction Passport Card & EDL Alternative to an ordinary U.S. passport booklet for land and sea travel within North America Cannot be used for international air travel Incorporate an EPC tag EDL (Enhanced Driver’s Licenses) Regular driver’s license + Passport card Authors use Washington State EDLs (WA EDLs)

Introduction Vulnerability Analysis Cloning The publicly readable data can be straight-forwardly cloned after a single read Tag Identifier (TID): tag-specific serial number Readability Other attacks EDLs are vulnerable to denial-of-service and covert-channel attacks

Experimental Evaluation of Passport Card and EDLs Weakness in the TID-based anti-cloning mechanism Other memory banks Kill-PIN selection Read-range experiments

Authors have cloned a Passport Card and a WA EDL Experimental Evaluation of Passport Card and EDLs Weakness in the TID-based anti-cloning mechanism The U.S. Department of Homeland Security think that TID can be used to remove the risk of cloning However, Gen-2 standard only requires TID identify the manufacturer and information about the tag’s capabilities Authors have cloned a Passport Card and a WA EDL Also, tag-specific TID does not prevent the emulation of an EPC tag (logical copying)

Experimental Evaluation of Passport Card and EDLs Other memory banks The entire EPC memory bank which contains the card’s unique EPC value is readable Kill-PIN selection Kill-PIN is unprogrammed and not locked on WA EDLs Can directly write 32-bit Kill-pin Can kill a cloned EDL

Radio-opaque shielding sleeve Experimental Evaluation of Passport Card and EDLs Read-range experiments Read ranges: a major determinant of the vulnerability of an EDL or Passport Card to clandestine cloning attacks and attacks against privacy Single scan of a tag is sufficient to create a clone Radio-opaque shielding sleeve uncertain that EDL and Passport Card bearers will consistently use their protective sleeves

Experimental Evaluation of Passport Card and EDLs Read-range experiments

Defensive Directions: Backward Compatible Cloning Defense Class-1 Gen-2 has no explicit anti-cloning feature Co-opting of two Gen-2 access control commands for authentication tag are proposed Co-opting KILL for tag authentication Co-opting ACCESS for tag authentication

Co-opting KILL (1/3) The KILL command is an EPC feature designed to protect consumer privacy by allowing tag to be disable at the point of sale in retail environments When the kill command received along with a tag-specific 32-bit KILL PIN Pkill, tag becomes permanently inoperative. This operation is a power intensive operation Image source: Ari Juels, “RFID Security and Privacy: A Research Survey”. Journal of Selected Areas in Communication (J-SAC), 24(2):381-395, February 2006.

Co-opting KILL (2/3) A reader with knowledge of Pkill can authenticate a tag by constructing an invalid PIN P’kill and transmitting the pair (Pkill ,P’kill) in random order A valid tag will acknowledge the correct PIN and reject the incorrect PIN, an invalid one can respond correctly with the probability at most ½ (KBA – Kill Based Authentication) While a detection probability of ½ is not high enough for an individual tag, it is high enough for detection of cloning on a systemic basis

Co-opting KILL (3/3) The challenge of KBA is the reliable transmission of command in the low-power regime of a target Too much power and the tag will be killed (permanently inoperative) Too little power, and the tag will not respond

Co-opting ACCESS (1/2) EPC tags can carry secret data D with read-access control Such data are readable only through use of the ACCESS command, with an accompanying tag-specific 32-bit PIN Paccess The Passport Card which analyzed here has both Pkill and Paccess set and locked But Washington State EDL could have its Pkill set and locked over the air (its Paccess is already set and locked)

Co-opting ACCESS (2/2) An entity with knowledge of Paccess for tag as well as D can authenticate the tag by checking D An entity without knowledge of Paccess cannot extract D without physically attacking the tag Known as ACCESS-based authentication (ABA) Challenge and Response Mechanism using ABA

Advantage and Limitation KBA is of interest for two reason ACCESS is optional command in EPC standard It is possible to deploy ABA and KBA independently KBA if not carefully implemented may actually kill the card as side-effect Neither technique is resistant to eavesdropping, cause they are ad hoc tools meant to allow authentication in the absence of cryptography or other supporting features The most compelling feature of KBA and ABA is their backward compatibility

Experiments with and Extensions to KILL-Based Authentication Simple KILL-based authentication Reader ramps up the power until it receives response from a tag 15dBm to 30dBm in 0.25bB increments When reader successfully receives a replay from the target tag, the power level is fixed The reader then send N KILL commands, With N-1 bogus PINs, and 1 real PIN

Experiments with and Extensions to KILL-Based Authentication Scaled KILL-based authentication Determine the minimum reader power level PW RR to read target Determine the minimum reader power level PW RW to write target Verify PW RW - PW RR ≥ µ (minimum power-margin parameter) Scale the reader’s power level PW RW + δ(PW RW - PW RR), δ Є [0,1] Ensure the power level selected doesn’t allow a tag to write itself

Conclusion Class-1 Gen-2 tag can be cloned, need multiple security layer for supporting anti-counterfeiting not just using TID (authentication) In case of Passport Cards and Enhanced Driver license implication in the operational setting of border control are themselves some what more complicated Employing RFID technology in security sensitive environment needs government regulation to ensure the security