Any potential security risk with these cards? Transportation Card Access Card Credit Card Any potential security risk.

Slides:



Advertisements
Similar presentations
1 Credentials 2 WSE Credentials Pick the credential that best suits your needs Multiple technology card gives ultimate flexibility Long-read range card.
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Adaptive Accurate Indoor-Localization Using Passive RFID Xi Chen, Lei Xie, Chuyu Wang, Sanglu Lu State Key Laboratory for Novel Software Technology Nanjing.
Chapter 13 Transmission Lines
 Signals  Analog and Digital  Analog and Digital Data & Signals  Periodic & Aperiodic Signals.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
Digital Wallet Alberto Almonte (CPE) Miles Curiotto (CPE) Michael Stross (EE) The new, compact, secure and efficient way to carry all your credit and debit.
A Parametric Study on the Platform Tolerance of RFID Antennas and their Performance Enhancement with Artificial Magnetic Conductors A. S. Hoenshel and.
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.
Wireless System for TPS Sensors Presented By: Tye Reid and Greg Swanson.
Lesson Title: Electromagnetics and Antenna Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
9. Radiation & Antennas Applied EM by Ulaby, Michielssen and Ravaioli.
Overview of RFID System Characteristics Operating Frequency Method of Coupling Transmission Range Data Storage Capacity Power Supply (Active, Passive)
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Innovative RFID Localization System Bassel Tawfik.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Effect of Mutual Coupling on the Performance of Uniformly and Non-
Chapter 4 Linear Wire Antennas ECE 5318/6352 Antenna Engineering
1 Design of RFID Tags for the Real World (and how to test you got it right) Ian J Forster Clive P Hohberger.
Korea University Ubiquitous LAB. Chapter 2. RF physics Ph.D Chang-Duk Jung.
Hongbo Zhang, Yuelin Du, Martin D.F. Wong, Yunfei Deng, Pawitter Mangat Synopsys Inc., USA Dept. of ECE, Univ. of Illinois at Urbana-Champaign GlobalFoundries.
Beyond One-dollar Mouse: A Battery-free Device for 3D Human-Computer Interaction via RFID Tags Qiongzheng Lin Lei Yang,Yuxin Sun,Tianci Liu,Xiang-Yang.
1 ECE 480 Wireless Systems Lecture 3 Propagation and Modulation of RF Waves.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Introduction to RFID Technology By: Vahid Bagher Poor 1.
© 2006 EXFO Electro-Optical Engineering Inc. All rights reserved. Agenda Introduction Digital Transmission Dispersion in optical Networks. Dispersion challenges.
Advanced Sensors for the Smartgrid
Doc.: IEEE /1145r0 Submission September 2015 Intel CorporationSlide 1 SU-MIMO Configurations for IEEE ay Date: Authors:
Part I: Dipoles by Marc C. Tarplee Ph.D. N4UFP
ENE 429 Antenna and Transmission lines Theory
BackPos: Anchor-free Backscatter Positioning for RFID Tags with High Accuracy Tianci Liu, Lei Yang, Qiongzheng Lin, Yi Guo, Yunhao Liu.
11/18/2003 Smart Card Authentication Mechanism Tim W. Baldridge, CISSP Marshall Space Flight Center Office of the Chief Information Officer.
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
LIBRARY AUTOMATION USING RFID LIBRARY AUTOMATION USING RFID Presented by; Joju Mohan -67 Ninitha Xavier -68 Priyanka C.P -69 Rahul K.Raj -70.
Hanyang University 1/21 Antennas & RF Devices Lab. antenna arrays and automotive applications Kim Tae Won.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Teng Wei and Xinyu Zhang
Input Devices.
Indoor Positioning System
Secure authentication with Windows Hello
Fang-Lin Chao and Ja-Der Lin
Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran
Apple Pay Research on NFC and the security threat
Localization by RFID ref:
Localization by RFID ref:
Team 7 Technical Presentation
Chapter 5. Polarization 第五章 極化 亞洲大學 資訊工程學系碩士班 呂克明教授 二○○六年十月十六日
N-Guard: a Solution to Secure Access to NFC tags
Performance Specifications
Combating Tag Cloning with COTS RFID Devices
William Claycomb and Dongwan Shin
Amplitude, Period, and Phase Shift
INFORMATION SYSTEMS SECURITY and CONTROL
Elecbits.
Application protection
Web Information Systems Engineering (WISE)
RFID Object Localization
Antenna Theory Chapter.4.7.4~4.8.1 Antennas
Introduction Radio Frequency Identification (RFID)
Electromagnetic (EM) Wave
Presented by Andrea David
RIO: A Pervasive RFID-based Touch Gesture Interface
Presentation transcript:

Any potential security risk with these cards? Transportation Card Access Card Credit Card Any potential security risk with these cards?

Why can’t these cards resist loss and thievery? Thievery Loss Why can’t these cards resist loss and thievery?

Sth you have? Who are you?

Different users  Different signals User-dependent

Radiative & Inductive coupling

Phase of individual tags Observation 1 --- Impact of tag coupling Tags in a vicinity  Their phases change Phase of individual tags

Coupling phases of tags Observation 1 --- Impact of tag coupling What will happen if we rotate some of the tags in the array? Coupling phases of tags

Why does the phase change due to coupling?

Observation 2 Impact of human impedance

Why does phase change with fingertip touch?

User-dependent & Unique Phase Fingerprint Phase of individual tags Coupling phases of tags Phase Difference of Tags (PDoT)

Challenge 1 The impact of touching is unstable. Touch different tags Touch Tag9 3 times without conductor

Tackle with challenge 1 Introduce a conductor Complexity of coupling:Distance between all tags is minimized that phases become more complex. Size of array:Maximum distance of any two tags should be within half of wavelength.

Challenge 2 Phases change with distance.

Tackle with challenge 2 Phase shifting algorithm

Get phase fingerprint at this status Tackle with challenge 2 Phase shifting algorithm 1 2 Max PDoT Max PDoT Get phase fingerprint at this status 1 2 Max PDoT

Tackle with challenge 2 Phase shifting algorithm

1. Impinj R420 reader 2. Larid antenna A9028 3. Alien-9629 tag

Overall accuracy vs. Human diversity 7 females + 8 males 15 representative tag array layouts Accuracy > 99% FAR: Incorrectly accept an access of an unauthorized user FRR: Incorrectly rejects an access of an authorized user

Resisting impersonation attack Attackers try to use an authorized user’s credential to access the system. FAR < 0.05 Maximum FRR < 0.1

Resisting counterfeiting attack Attacker produces a counterfeited array with the same tag model and layout. 90 Alien-9629 tags 10 arrays Average FAR < 0.01 FRR < 0.005

Resisting replay attack Effective read range < 30cm Tolerable space angle of tag rotation < 10° (w.r.t. x-y-z axis)

Accuracy vs. distance Effective range ≈ 15cm Reader antenna Tag Accuracy vs. distance Vertical distance Horizontal distance Effective range ≈ 15cm ±4cm region > 90% accuracy

Accuracy vs. rotation Tolerable space angle < 10°

Converting an array of tags attached on a card into an effective authentication credential. Light-weight, low-cost, universal solution for a fingertip profiled RF identifier, authenticating both the card and its holder’s identity simultaneously. Demonstrated a working system implemented purely based on COTS RFID devices.