A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.

Slides:



Advertisements
Similar presentations
Mitigate Unauthorized Tracking in RFID Discovery Service Qiang Yan 1, Robert H. Deng 1, Zheng Yan 2, Yingjiu Li 1, Tieyan Li 3 1 Singapore Management University,
Advertisements

1 Security in Wireless Protocols Bluetooth, , ZigBee.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Sri Lanka Institute of Information Technology
Digital Signatures and Hash Functions. Digital Signatures.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
SMUCSE 5349/73491 Authentication Protocols. SMUCSE 5349/73492 The Premise How do we use perfect cryptographic mechanisms (signatures, public-key and symmetric.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Sec final project A Preposition Secret Sharing Scheme for Message Authentication in Broadcast Networks 王怡君.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
YA-TRAP: Yet Another Trivial RFID Authentication Protocol Gene Tsudik International Conference on Pervasive Computing and Communications, PerCom 2006.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
R R FID Authentication : M inimizing Tag Computation CHES2006 Rump Session, Yokohama. Japan Ph.D. Jin Kwak Kyushu University, JAPAN
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic.
SECURE SYMMETRIC AUTHENTICATION FOR RFID TAGS
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
- 1 - Secure and Serverless RFID Authentication and Search Protocols Chiu C. Tan, Bo Sheng, and Qun Li IEEE Transactions on Wireless Communication APRIL.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
RFID Security without Extensive Cryptography Sindhu Karthikeyan Mikhail Nesterenko Kent State University SASN November 07, 2005.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
EPCglobal Network Security: Research Challenges and Solutions Yingjiu Li Assistant Professor School of Information Systems Singapore Management University.
Chapter 21 Distributed System Security Copyright © 2008.
WEP Protocol Weaknesses and Vulnerabilities
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
RFID SECURITY.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster Presented: Jesus F. Morales.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Fall 2006CS 395: Computer Security1 Key Management.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Security of the Internet of Things: perspectives and challenges
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-00.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
Protecting the Privacy of RFID Tags
An Improved Novel Key Management Protocol for RFID Systems
Presentation transcript:

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International Research Center for Information Security CONFERENCE ON RFID SECURITY-07

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 2 Introduction - EPCglobal  EPCglobal Inc™ Industry-driven standards RFID in supply chain management  We consider EPCglobal Architecture Framework EPCglobal Class 1 Gen 2 UHF RFID Protocol

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 3 Contents  Introduction  RFID-based supply chain management system EPCglobal Architecture Framework  Security Threats and Requirements  Security Assessment of Class 1 Gen 2 UHF RFID Protocol  Proposed Tag-Reader Mutual Authentication Scheme Scheme Analysis  Conclusion and Future Work

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 4 EPCglobal Architecture Framework EPC-IS

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 5 Introduction - Tag’s 4 Memory Blocks **We Focus on RESERVED memory Block** RESERVED memory Block has…. Access Password (APwd) Kill Password (KPwd)

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 6 Introduction - RESERVED Memory Block  Manufacturer of the product stores APwd and KPwd in the Reserved Memory Bank  Reserved Memory Bank is R/W LOCKED, Cannot be Read Cannot be Re-Written

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 7 Security Threats and Requirements  Tag-Reader Mutual Authentication Malicious RFID Readers  Snoop, corrupt, manipulate Cloned Fake RFID Tags  Counterfeit products Man-in-the-Middle Attack  Eavesdrop and impersonate  Tamperproof Tags RFID Tag Snatching

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 8 One-Way Reader to Tag Authentication Proposed by EPCglobal  Proposed by EPCglobal Class 1 Gen 2 UHF RFID Protocol  Not Secure  Un-encrypted openly sent random numbers used as pads to cover-code tag’s APwd  Tag’s Access Password easily exposed to disgruntled employee managing hand-held reader

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 9 Security Weakness – EPCglobal Schheme – Exposed APwd Manufacturer Reader Tag Unauthorized Access Fake Cloned Tags APwd Apwd (Exposed) Only one-way Reader-to-Tag Authentication Malicious, Compromised Reader Disgruntled Employee

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 10 Goals  Tag-Reader mutual authentication simple, light-weight, practically secure (supply chain)  A better cover-code or obscure tag APwd  Secure distribution of obscured tags' APwd to stakeholder's RFID readers  The manufacturer: implicitly keep track on the whereabouts of its products.  Our scheme adheres to EPCglobal standards

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 11 Goals NO cryptographic (hash) functions/keys within the tag NO tag - reader synchronization security keys/hash values.  We improve scheme proposed by EPCglobal to accommodate tag-reader mutual authentication. Our scheme utilizes tag's already existing,  16-bit random number generator,  XOR function,  Access & Kill Passwords.

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 12 Proposed Tag-Reader Mutual Authentication Scheme  Emphasis on Tag’s Access & Kill Password  Manufacturer of the product is involved in the mutual authentication process  Scenario: A pallet has reached the distributor Distributor’s reader query tag on pallet Reader and Tag must authenticate each other Reader does not know tag’s Apwd Reader contact manufacturer and follow this procedure

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 13 Proposed Tag- Reader Mutual Authentication

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 14

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 15

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 16 Pad Generation Function: PadGen(.) [1/3]

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 17 Pad Generation Function: PadGen(.) [2/3] Random Numbers from Tag and Manufacturer

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 18 Pad Generation Function: PadGen(.) [3/3]

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 19 Tag’s Logical Memory & Access Password Map

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 20 Security Analysis [1/4]  Possible Attacks APwd & KPwd are only 32-bits Brute-force attack or ciphertext-only attack  Practically Secure An enclosure (warehouse) that is sealed from external noise and radio signals from malicious readers. RFID supply chain processing environment  Extremely fast paced  Not feasible to continuously eavesdrop on one particular tag- reader communication channel  Several bulks of items pass through several readers with in a very short interval of time.

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 21 Security Analysis [2/4]  Reader Impersonation Attack: Reader to authenticate first to tag A malicious reader  Does not posses both the APwd and KPwd  cannot access manufacturer (EPC-IS) due to lack credentials.  Cloned Fake Tags and Tag Impersonation Attack: Tag to authenticate to the manufacturer. A malicious tag or a cloned fake tag  Do not posses both the APwd and KPwd, Manufacturer must detect and terminate the communication,  if a tag emulator using the same or weak random numbers  if tag is not moving through the supply chain processing

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 22 Security Analysis [3/4]  Tag's Access Password Never Exposed: Does not use random numbers sent in an un-encrypted form as pads Generated pads are known only to tag and manufacturer  Secure against Insider Attacks: Does not deliver the tag's APwd to any of the stakeholder's reader. The reader relays only the cover-coded APwd RFID “system level check",  A compromised reader is continuously trying to interrogate only one particular tag

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 23 Security Analysis [4/4]  Secure against Replay Attacks: We use two random numbers each, generated by both the tag and the manufacturer. As unique random numbers generate unique pads  Password Scalability: We adhered to the 32-bit passwords Our scheme can still be applicable, and more strengthened, when the length of the APwd and KPwd is extended

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 24 Implementation Analysis [1/2]  Overhead Analysis Secure channel between tag and manufacturer  PKI-based certificate, encryption and signature schemes – may be expensive Reader communicate with manufacturer to authenticate every tag  To reduce this overhead, The manufacturer can setup a secure server at every stakeholder's supply chain processing facility Only, the manufacturer can remotely access, monitor, and manage this server and also update the server with tags' Access & Kill passwords We can also assume that the manufacturer's EPC-IS is a highly resource rich entity, which is designed to take heavy computational and storage load. Secure channel with only Keyed-Message Authentication Code (MAC)

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 25 Implementation Analysis [2/2]  Light-Weight Tag-Reader Mutual Authentication: Our scheme does not use any special cryptographic functions. Tag already has capability  XOR operations,  Generate random numbers,  Temporarily store random numbers  Fetch the APwd and KPwd  Our scheme just needs an additional Five 16-bit temporary storage memory slots four random numbers from the manufacturer and one for PadGen(.) function. Class-1 Gen-2 tags can have a 512-bit memory capacity or more (depending on the manufacturer)

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme 26 Conclusion  Our scheme Not fully secure Simple, cost-effective, light-weight to be implemented on tag Practically secure, Highly suitable to the RFID-based supply chain processing scenario Adhere to EPCglobal standard  Our scheme provides considerable challenges to thwart Cloned fake tags Malicious readers Disgruntled employees or compromised readers Tag’s APwd leakage Man-in-the-middle attacks

Thank you! Q&A International Research Center for Information Security