11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop1 Enhancing RFID Privacy via Antenna Energy Analysis Ken Fishkin: Intel Research Seattle Sumit Roy: U.

Slides:



Advertisements
Similar presentations
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Advertisements

Speed to Market RFID at Liz Claiborne Solving an Internal Distribution Issue Brian O’Donnell 7/22/04.
RFID – Lessons Learned July 22, 2004 Russ Brown. Agenda vRFID Basics vRFID Vision vRFID Upside vRFID Concerns vRFID Lessons Learned vRFID Future State.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
Authored by Gary Dawson 01-Jan-2012 TX-129 Fort Worth Senior Squadron Modified by Lt Colonel Fred Blundell TX-129 Fort Worth Senior Squadron For Local.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Security in RFID Presented By… NetSecurity-Spring07
Advancing Wireless Link Signatures for Location Distinction J. Zhang, M. H. Firooz, N. Patwari, S. K. Kasera MobiCom’ 08 Presenter: Yuan Song.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
Benefits of Early Cache Miss Determination Memik G., Reinman G., Mangione-Smith, W.H. Proceedings of High Performance Computer Architecture Pages: 307.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
RFID Cardinality Estimation with Blocker Tags
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID Technology and Asset Tracking “Any sufficiently advanced technology is indistinguishable from magic.” Arthur C Clark.
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
RFID Radio frequency identification,or RFID,is an Auto-ID technology that uses radio waves to identify a physical object. Tags ReaderAntenna.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Zac Chupka Jeff Signore.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
Nick Ruggieri CIS 1055 Section 005 Radio Frequency Identification  RFID System A wireless, non contact system that uses data from a tag for the purpose.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
Jörn-Marc Schmidt Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
RFID Myths, Facts and Reality. What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Yafeng Yin 1, Lei Xie 1, Jie Wu 2, Athanasios V. Vasilakos 3, Sanglu Lu 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China.
BLUETOOTH BASED LOCATION SYSTEM SULAIMAN AL AWAD HANI AL RUWAILI.
Practical Attacks on a Proximity Card Jonathan Westhues June
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Overall: 9/10. GOODWORK ON  Good information  Very detailed  Nice Introduction  RFID has many similarities with barcoding but with the unique characteristics.
Radio Frequency Identification
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Introduction of RFID Presented by Group 2
RFID SECURITY.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Tamper Resistant Software: An Implementation By David Aucsmith, IAL In Information Hiding Workshop, RJ Anderson (ed), LNCS, 1174, pp , “Integrity.
Ubiquitous means ‘everywhere’
Jin Young Kim, Kwangwoon University Slide 1 Nov Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
RFID TAG READER TAG READER Abdullah Al-Faifi ) ) ) ) )
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Unit 2 Technology Systems
RADIO FREQUENCY IDENTIFICATION (RFID) FOR LIBRARIES
By: Tarun Sharma Chinta Rahul SCSE VIT University
English for Advance Learners I
sip-identity-04 Added new response codes for various conditions
Radio Frequency Identification (RFID)
BEYOND THE BARCODE Beyond the Barcode.
Concept of Power Control in Cellular Communication Channels
Human Computer Interaction International 2007
Radio Frequency Identification
Selective Blocking of RFID Tags for Consumer Privacy
Advancing Wireless Link Signatures for Location Distinction
RFID used for real-time tracking Physics 490 seminar 4/15/2019
Presentation transcript:

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop1 Enhancing RFID Privacy via Antenna Energy Analysis Ken Fishkin: Intel Research Seattle Sumit Roy: U. Washington EE Thanks to: Bing Jiang, U Washington EE

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop2 Introduction “With great power, comes great responsibility” Privacy worries have a legitimate basis “Deployed naïvely, embedding of RFID tags in consumer items presents a serious danger to privacy.” (Ari Juels) Can we address privacy worries realistically? Can we provide post-checkout value?

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop3 Isn’t this a known problem? Much investigation of privacy and security mechanisms in other domains: File systems, , Ecommerce, Wireless We can leverage some of this One qualitative difference: the “donation” of energy by one party to the other. Bad news: can’t do much computation Is there good news? Can we leverage this unique difference? Two proposals will be presented

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop4 Distance implies distrust Why aren’t people upset about bar codes? Bar code scanners are close and known Most “nightmare” RFID scenarios involve distant and unknown Basic idea: can we require higher “bona fides” for more distant interrogators?

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop5 First idea: distance inference Does the energy wave change with distance? If so, can we infer distance from wave properties? Can we do it robustly? RFID signal highly influenced by environment Three techniques presented 1 largely negative result 1 open for investigation 1 initially positive result

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop6 #1: Look at wave curvature

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop7 #1: Look at wave curvature Fraunhofer far field effect: ≈(2 f d^2) / c m0.00 m m0.01 m m0.41m f d (Environmental fluctuation may swamp comparison)

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop8 #2: Look at wave phase Need to compare amongst multiple tags. Under investigation

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop9 #3: Look at noise Signal/noise goes down with propagation Doesn’t require multiple tags

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop10 Spoofing Can’t the hostile reader just change its energy signature to match that of a nearby reader? NO – you can’t have less than zero noise. You can spoof being farther (but why would you?) but not nearer than you really are.

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop11 Assuming it works Slight enhancement to tag circuitry: enforce maximum range, and/or report reads beyond that range And/or turn yourself into a “blocker tag” Requires no reader modification Requires no protocol modification But limited: distant interrogators may be OK, nearby may not be

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop12 Second idea: tiered revelation Can we go “Beyond the kill switch”? “The problem with radio frequency ID is that it’s clear how retailers and manufacturers might benefit from attaching smart tags to their products, but it’s utterly unclear how this helps consumers.” (Technology review, 3 Nov 2003) Look at scenarios which provide post- purchase direct benefit to consumers

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop13 Energy-sensitive revelation Bought at Nordstrom’s, downtown Seattle Bought 7/28/03 Made in Kuala Lumpur, Factory #17 Made 2/5/03 Benetton model X3J4 Size L 75% cotton, 25% poly Mauve Shirt Object Dryer Insurance Nordstrom’s Recall check Washer They don’t all require all the same information What if we make the “Bar” higher, the more information you want?

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop14 The proposal Tags move to a challenge-response system. Use energy the closer the reader is, the more processing you can do Tag then reveals highest level of authenticated information

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop15 How this works 1. Reader specifies which level it wants 2. Tag specifies level of security, and/or amount of energy needed 3. Reader proceeds at that level of security 4. Respond if and only if get energy and security required Only energy increases – rough and simple distance requirement Only security increases – as existing protocols Both increase – interesting combination to explore

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop16 Assuming it works Requires changes to readers Requires changes to tags Requires changes to protocol But buys you a much more robust, extensible functionality

11/15/2003 Fishkin/Roy - MIT RFID Privacy Workshop17 Conclusion Distance implies distrust: closeness implies comfort Energy can be used as a variable in the privacy equation Two examples presented: one easy and weaker, one hard and stronger