Embedded Wireless Sensors Tony Arous Vincent Yu. Recap  RFID– Radio Frequency Identification  Sensors help to easily keep track of various information.

Slides:



Advertisements
Similar presentations
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
Advertisements

Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Digital Wallet Alberto Almonte (CPE) Miles Curiotto (CPE) Michael Stross (EE) The new, compact, secure and efficient way to carry all your credit and debit.
Embedded Wireless Sensors Tony Arous Vincent Yu. Introduction  Sensors help to easily keep track of various information PeoplePeople ProductsProducts.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Principles of Information Security, 2nd edition1 Cryptography.
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
FIT3105 Smart card based authentication and identity management Lecture 4.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Lecture Notes #7 Radio Frequency Identification (RFID)
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
THE COMPANY ACORDE is a telecommunications company aimed at the design and development of products and services at the highest level of technology present.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Hospital Automation using RFID Technology University of Colorado at Colorado Springs College of Engineering & Applied Science Gustavo Florentino.
BLUETOOTH BASED LOCATION SYSTEM SULAIMAN AL AWAD HANI AL RUWAILI.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Radio Frequency Identification (RFID)
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Embedded system security
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Security of the Internet of Things: perspectives and challenges
Electronic Banking & Security Electronic Banking & Security.
Information Systems Design and Development Security Precautions Computing Science.
RFID Security Tony Arous Vincent Yu.
RFID Security Tony Arous Vincent Yu.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Public-Key, Digital Signatures, Management, Security
Presentation transcript:

Embedded Wireless Sensors Tony Arous Vincent Yu

Recap  RFID– Radio Frequency Identification  Sensors help to easily keep track of various information PeoplePeople ProductsProducts Chemical CompositionChemical Composition  Each application requires a different type of sensor

Possible Uses on Humans  Identification  Security  Tracking  Monitoring vital signs  Diabetes monitoring  Medical purposes

Focuses on Security  How secure is RFID? Encryption is weak and can easily be spoofed in hoursEncryption is weak and can easily be spoofed in hours  Example: Exxon Speedpass and Ford 40bit encryption made by TI40bit encryption made by TI With a microreader and laptop, these information can be extracted from these devicesWith a microreader and laptop, these information can be extracted from these devices

Cracking the Code

Security Problems  A more secure system is needed  Must limit what people have access to vital, secret information  Some RFID tags can be read at any time with no notification

Security Problems  Unique ID for every individual item in stores ID’s will then be tied to credit cardsID’s will then be tied to credit cards Security problems if tags are stolen, lost or removed from the productsSecurity problems if tags are stolen, lost or removed from the products  An effective method of destroying stored information after some time is needed

Privacy Issues

Current Security Problems  Today’s RFID systems use a simple encryption technique  Over 150 million RFID tags made by TI are being used today  All tags are based on the same encryption  Researchers cracked the SpeedPass technology in 16 minutes

Resolutions  Key length of the encryption should be the standard Advanced Encryption Standard (AES) in its 128-bit form  Shielding the RFID from scanners  Scanners to deactivate RFID chips when leaving the store

Problems with the Resolutions  Longer encryption lengths means higher costs, more power consumption and a possibility that it will not be backwards compatible with older devices  Shielding the device is not a good method due to added size and potentially be an inconvenience to users. This would also not be workable if the RFID would be implanted into humans  Deactivating tags is not wanted for some tags (Speedpass & Fast Lane)

Integrating Solutions  The scanners read encrypted information from RFID chip which sends it to a computer to decrypt.  The computer will then determine what information to pass to the scanner

Integrating Solutions  A computer will be able to process more information and stronger encryption codes than the scanner can

More Concepts  Other methods may work to achieve the same goal, but each one offers its own disadvantages.

Tag/Reader Combinations  Potential Solution: Restrict a tag to communicate to specific readersRestrict a tag to communicate to specific readers  Tags would maintain static information about which readers have access  Problems: Upgraded technologyUpgraded technology Expensive to require specific readersExpensive to require specific readers

Proposed Solution  Follow the method used in medical RFID technology  Communicate with authentication server to verify information  Internet connection will be necessary Additional technology neededAdditional technology needed  WiFi, Ethernet, Bluetooth Create a more efficient and secure reader/tag systemCreate a more efficient and secure reader/tag system

Proposed Solution

Internals  Requirements Power consumption: < 20 uAPower consumption: < 20 uA Chip size: < 1 mm 2Chip size: < 1 mm 2 Low cost: 5 to 50 centsLow cost: 5 to 50 cents CompatibilityCompatibility

Internals

AES Module  On-demand and live calculation  8 bit architecture

Internals  Microcontroller: RISC Machine:RISC Machine:  12 bit instructions  4 bit data bus  32 registers  AES: Pre-existing technologyPre-existing technology

Questions from Last Time  Can IDs or the information they transmit be spoofed? Yes, we need to include preventative measures in our encryption techniques.Yes, we need to include preventative measures in our encryption techniques.  How can you ensure encryption when only a limited amount of data can be stored on a RFID tag? Data is either permanently stored or generated on-demand.Data is either permanently stored or generated on-demand. Encryption device will be permanent and then transmit modified data, reducing the need for more storage space.Encryption device will be permanent and then transmit modified data, reducing the need for more storage space.

More Questions  How will you reduce the number of collisions? We’ll discuss in more detail next time based on some new techniques being researched.We’ll discuss in more detail next time based on some new techniques being researched.  What is our goal? We are looking at this project from an investigative/research point of view. We hope to make suggestions to existing technology.We are looking at this project from an investigative/research point of view. We hope to make suggestions to existing technology.

Next Time…  Discuss some security techniques being researched now Juels-Pappo Banknote Protection SchemeJuels-Pappo Banknote Protection Scheme El Gamal cryptosystemEl Gamal cryptosystem Interleaved protocolInterleaved protocol

References  /2005/1/31/technology/ &sec=technology   graz.ac.at/aboutus/people/feldhofer/papers/melecon_slides.pdf  banknote-slides.pdf 