Selective Blocking of RFID Tags for Consumer Privacy

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

SMUCSE 7349 RFID Security. SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War.
Speed to Market RFID at Liz Claiborne Solving an Internal Distribution Issue Brian O’Donnell 7/22/04.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
RFID in Indoor Location Sensing Sucharitha Saibaba Divya Gopinathan.
Security in RFID Presented By… NetSecurity-Spring07
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Topic 3: Sensor Networks and RFIDs Part 3 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
RFID Cardinality Estimation with Blocker Tags
RFID Security & Privacy Matt Hansen University of Illinois Fall 2007.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
Radio frequency identification technology (RFID) Dominic Payne Janna Thomson Kevin Mackay.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
RFID Technology and Asset Tracking “Any sufficiently advanced technology is indistinguishable from magic.” Arthur C Clark.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
RFID Technology in Healthcare Presenters: Lauren Gunn and Connor Zale.
IWD2243 Wireless & Mobile Security
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
RFID Inventory Management And Tracking System Greg McDaniel Hashem Garner Adam Kesner Thomas Harris.
1 Ch. 17: Security of RFID slide 1. 2 Roles of RFID applications slide 2 TagsReaderServer(Database) Secure channel Slides modified from presentation by.
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
RFID Technology What is it? (And why should you care?)
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels, Ronald Rivest, and Michael Szydlo ACM CCS, October 2003 Presented by Himanshu.
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Radio Frequency Identification
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
RFID Lynsey Charles Kyle Jahnke Andrew Kangerga Jake Whitesides
RFID A technology I advocate, despite the disadvantages Will cover what it is, how it’s used, its advantages, and its bad side.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
Yes? Or No?. Radio-frequency identification is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product,
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Intelligent parking system based on RFID
Unit 2 Technology Systems
Radio Frequency Identification composition - implementation – vision
RADIO FREQUENCY IDENTIFICATION (RFID) FOR LIBRARIES
By: Tarun Sharma Chinta Rahul SCSE VIT University
English for Advance Learners I
What is a Radio-Frequency Identification (RFID) tag?
Radio Frequency Identification (RFID)
Radio Frequency IDentification
RFID Technology & It’s Uses
RADIO FREQUENCY IDENTIFICATION
Team 7 Technical Presentation
Elecbits.
Radio Frequency Identification
Randomized PRF Tree Walking Algorithm for Secure RFID
- Dylan Leintz - Dr. Davies
Mobile Computing Lecture Materials By Bintang Eka Putera.
RFID used for real-time tracking Physics 490 seminar 4/15/2019
Presentation transcript:

Selective Blocking of RFID Tags for Consumer Privacy Ari Juels and Ronald L. Rivest and Michael Szydlo Presented by Aviram Shmueli 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags RFID – What is it? RFID – Radio-Frequency Identification RFID implementation consists of the following three parts: Tag (small integrated circuit attached to an antennae) Tag reader Database & software Tag holds a unique serial number which identifes the item it attached to 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags RFID Uses Retail & Distribution Automated Checkout Keyless Entry Theft Detection Pet Identification Logistic Assets 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags RFID Vs. Barcode Barcode RFID Optical technology RF technology Line of sight only Non line of sight Read only Read only or read/write capable Smaller range (few cm) Longer range (few meters) Can carry data (2D) Can carry more data Not reusable reusable Sensitivity to dust, moisture and packaging Insensitivity to enviromental factors 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags RFID Benefits More information Individual item data & tracking Small As small as 0.4mm x 0.4mm Ability to be embedded in almost every product Fast Data retrieval done in miliseconds No contact Cheap 0.05$/unit 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags RFID Tag Attributes Active RFID Passive RFID Tag Power Source Internal to tag Energy transferred using RF from reader Tag Battery Yes No Required signal strength Very Low Very High Range Up to 100m Up to 3-5m, usually less Multi-tag reading 1000’s of tags recognized – up to 100mph Few hundred within 3m of reader Data Storage Up to 128 Kb or read/ write & search 128 bytes of read/write 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags Passive RFID Tags Example: passive tags in retail security applications Tag contains antenna and a small chip Tag is powered by the electromagnetic field generated in doorways, reflecting back a weak signal containing data 4/22/2019 Selective Blocking of RFID Tags

RFID Drawback – Threat to Privacy RFID technology faces a clear potential for privacy violations Location tracking Belongings tracking Ability to cross information with databases containing personal data 4/22/2019 Selective Blocking of RFID Tags

The “Kill Tag” approach Solution: “Kill” RFID tag upon purchase No purchased goods would contain active RFID tags Not Perfect: Returned products RFID receipts Indentification of food in the refrigarator Business cards 4/22/2019 Selective Blocking of RFID Tags

2. The Faraday Cage approach Solution: Protecting an RFID tag by a metal container Container is impenetrable by radio signals Not Perfect: Objects which can’t be placed in containers: Clothing Human beings 4/22/2019 Selective Blocking of RFID Tags

3. The Active Jamming Approach Solution: Carrying a device that broadcasts radio signals Device blocks/disrupts the operation of any nearby reader Not Perfect: May disrupt all nearby RFID systems, even those in legitimate application Dummy, Crude and brutal way 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags 4. The “smart” Approach Solution: When tag is locked it’s given a value y. Tag is unlocked by presenting a PIN value x such that h(x)=y, where h is a one way has function Not Perfect: Tracking tags through their y value Uncomfortable management Small budget 4/22/2019 Selective Blocking of RFID Tags

The Tree-Walking Singulation Algorithm Used by the RFID-tag reader Identifies serial numbers of nearby tags (usually 64,96,128 bits long) Based on a DSF of a binary tree Iniation: Assumes a subtree to be the starting point. Queries tags lying in the corresponding subtree: Tags reply: ‘0’ – if lies in the left subtree ‘1’ – if lies in the right subtree Collision – occurs when tags broadcast simultaneously ‘0’ and ‘1’ When Collision is detected, tag reader recurses beginning in the left child Outputs list of the ID numbers of all tags within range Complexity = ? 4/22/2019 Selective Blocking of RFID Tags

The Tree-Walking Singulation Algorithm 001 011 110 1 00 01 010 100 101 111 000 10 11 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags What is a Blocker Tag? Privacy Protection Performs a “Passive Jamming” Interferes with the tree-walking singulation protocol Simulates the full spectrum of possible serial numbers for tags Forcing reader to sweep a full space of all possible tags DoS attacks? 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags Blocker Tag – type 1 Universal Blocker Simultaneously broadcasts both ‘0’ and ‘1’ Creates a forced collision Tag reader must explore the all tree Exploring tree in depth 128 would never end Blocks reading of all tags Lack of flaxiblity 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags Blocker Tag – type 2 Selective Blocker Blocks only a certain zone (subtree) Simultaneously broadcasts both ‘0’ and ‘1’ only to queries which match certain condtions Use of regular expressions Reader might be stuck in a restricted subtree 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags Blocker Tag – type 3 “Polite” Blocking Involves protocol extension Several options New query: “Is this subtree blocked?” Policy declaration Enables flexible selective blocking of any node in the tree Defining privacy zones 4/22/2019 Selective Blocking of RFID Tags

Malicious Use of Blocker Tag Universal blocker Total DoS Simulation of actual tags Actual tags may not be distinguished Attacking the tag-reader software Gain control over the tag-reader software Gain access to the system DB 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags Privacy Zone Consists of a restricted range of tag serial numbers targeted for protection Once enteres privacy zone, reader is distrupted by the blocker-tag While reader remains outside the privacy zone, blocker-tag is inactive Enables transfering serial numbers from one zone to another 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags Glance to the future Clothing and personal appliances are marked with “zone-one” prefix Groceries are marked with “zone-one” prefix Alice might carry a “zone-one” blocker tag in her wrist-watch On groceries purchase, Alice is given “privacy stickers” carrying “zone-two” blocker tags In her Car, Alice uses a blocker tag of all the possible zones 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags Conculsions RFID tags are supposed to enormously widespread in the following years Usage of RFID technology raises potential for private threat Blocker tag approaches intend to significally reduce this threat Blocking is done “universally” or “selectively”, enabling defining “private zones” 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags Thank You 4/22/2019 Selective Blocking of RFID Tags

Selective Blocking of RFID Tags Home Assignment Describe the tree-walking singulation protocol. Describe the complexity of traversing through the all tree, using K (tree depth) and N (number of tags present). Name one advantage and one disadvantage of any of three mentioned blocking methods In your opinion, which of the proposed blocking methods should be adapted? aviram.shmueli@gmail.com 4/22/2019 Selective Blocking of RFID Tags