Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Slides:



Advertisements
Similar presentations
Emerging Threats, RF-ID and eCrime issues. Pascal Chauvaud 28/06/2006.
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
RollCaller: User-Friendly Indoor Navigation System Using Human-Item Spatial Relation Yi Guo, Lei Yang, Bowen Li, Tianci Liu, Yunhao Liu Hong Kong University.
Adaptive Accurate Indoor-Localization Using Passive RFID Xi Chen, Lei Xie, Chuyu Wang, Sanglu Lu State Key Laboratory for Novel Software Technology Nanjing.
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Location Privacy Preservation in Collaborative Spectrum Sensing Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Shanghai Jiao Tong University Kai Xing.
1 Ultimate in Card Security Enhancing the Security of RFID/Smart Cards using Secure OVD Detection 94 Old Camplain Road Hillsborough NJ
Building and Deploying the world’s first commercial application to address product authentication, brand protection and anti-counterfeiting Alpharetta.
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI Institute for Applied Information.
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Frogeye: Perception of the Slightest Tag Motion Lei Yang, Yong Qi, Jianbing Fang, Xuan Ding, Tianci Liu, Mo Li Tsinghua University, Xi’an Jiaotong University.
A Generic Framework for Handling Uncertain Data with Local Correlations Xiang Lian and Lei Chen Department of Computer Science and Engineering The Hong.
FLIGHT: Clock Calibration Using Fluorescent Lighting Zhenjiang Li, Wenwei Chen, Cheng Li, Mo Li, Xiang-Yang Li, Yunhao Liu Nanyang Technological University,
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Materi 2 (Chapter 2) ntroduction to Quantitative Analysis
RFID Cardinality Estimation with Blocker Tags
Lei Yang, Yekui Chen, Xiang-Yang Li, Chaowei Xiao, Mo Li, Yunhao Liu
RFID passports How does is work? Step by step By: Einav Mimram.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
The Strategic Management Process
Speed | Innovation | Happiness Confidential. © 2012 Bilcare Limited Bilcare Technologies and Fortified-ID Holdings Limited 2015 FAQ.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
ENTREPRENEURS IN A MARKET ECONOMY
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
AGENT-BASED GATEWAY OPERATING SYSTEM FOR RFID- ENABLED UBIQUITOUS MANUFACTURING ENTERPRISE - JI FANG, TING QU, ZHI LI, GANGYAN XU, GEORGE Q. HUANG HKUZIRI.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
KAIS T In-Vehicle Secure Wireless Personal Area Network (SWPAN) Reference: S. M. Mahmud and Shobhit Shanker, “In-Vehicle Secure Wireless Personal Area.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Predictive Modeling with Heterogeneous Sources Xiaoxiao Shi 1 Qi Liu 2 Wei Fan 3 Qiang Yang 4 Philip S. Yu 1 1 University of Illinois at Chicago 2 Tongji.
A high-level and hands-on approach for organizations to deal with counterfeiting and piracy. Jan Corstens WIPO Moscow
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI/SCA Leuven, BCRYPT.
EPCglobal Network Security: Research Challenges and Solutions Yingjiu Li Assistant Professor School of Information Systems Singapore Management University.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Requirements, Terminology and Framework for Exigent Communications H. Schulzrinne, S. Norreys, B. Rosen, H. Tschofenig.
On Distinguishing the Multiple Radio Paths in RSS-based Ranging Dian Zhang, Yunhuai Liu, Xiaonan Guo, Min Gao and Lionel M. Ni College of Software, Shenzhen.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
2-1 Chapter 2 Consumer Behavior, Eighth Edition Consumer Behavior, Eighth Edition SCHIFFMAN & KANUK Consumer Research.
RFID Enhanced Shopping Cart Matthew Breeden Stan Komsky Brendan Leahy Todd Kamon Ji Hwan Kim.
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
Electronic Commerce Semester 1 Term 1 Lecture 3. Types of E-Commerce There are three distinct general classes of e-commerce: –Inter-organisational (business-to-business/B2B)
Kerberos Guilin Wang School of Computer Science 03 Dec
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
A Biased Fault Attack on the Time Redundancy Countermeasure for AES Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen and Debdeep Mukhopadhyay.
Technology Supply Chain Management
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Principles of Marketing Lecture-13. Summary of Lecture-12.
BackPos: Anchor-free Backscatter Positioning for RFID Tags with High Accuracy Tianci Liu, Lei Yang, Qiongzheng Lin, Yi Guo, Yunhao Liu.
1 Version /05/2004 © 2004 Robert Oshana Requirements Engineering Analyzing the Problem.
Indoor positioning systems Kyle Hampton. Outline Introduction Uses Players Techniques Challenges Future Conclusion.
Counterfeiting Protection & Reduction MECH 3620 Advanced Manufacturing Process By: Rafael Mendez.
MGT301 Principles of Marketing Lecture-13. Summary of Lecture-12.
Teng Wei and Xinyu Zhang
Preventative Measures
Impregnable Brand Protection For Non-Electronic Products
Combating Tag Cloning with COTS RFID Devices
Any potential security risk with these cards? Transportation Card Access Card Credit Card Any potential security risk.
Zhiqing Luo1, Wei Wang1, Jiang Xiao1,
Presentation transcript:

Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu

Diversity

Fingerprinting genuineness 04. Outline Overview 02. Fingerprinting tags 03. Discussion 06. Validating genuineness 05. Motivation 01. Implementation and evaluation 07. Conclusion 08.

Motivation

WHO : 7~10% of the world’s pharmaceuticals are counterfeits in developed countries, 25%~50% in developing countries. Online counterfeit sales cost about $135 billions in Hong Kong Customs seized 55,000 fake drugs, worth around 5Millions HK$ each year. China loses about 600 billion per year due to fake goods.

State-of-art

How to deal with counterfeiting using RFID technology?

“5F8KJ3” “ ” “74AB8” Serial number based anti-counterfeiting State-of-art Eavesdropping Cloning Replaying RFID enabled anti-counterfeiting

State-of-art Tag Side-channel Reverse engineering Encryption based anti-counterfeiting Cloning RFID enabled anti-counterfeiting

Our approach Tagrint RFID diversity based anti-counterfeiting TagPrint

How TagPrint works? Overview the basic idea

RFID Diversity

RFID diversity Antenna size, impedance matching, clock skew, gain, …..

Validation is totally offline. The validation must be user-friendly. The price is cheap enough. Defending against various attacks, reverse engineering, eavesdropping, cloning, etc. Goal

System Entities (Roles) Tag Provider Product Manufacture Consumer

Overview

Tag Provider The tag provider manufactures the RFID tags, like Alien or ImpinJ Corp.

Overview Product Manufacture The product manufacturer utilizes the technique of RFID to protect their products from being counterfeited.

Overview Consumer The consumer, as a purchaser of product, desires to know whether the product is genuine.

Threat Model The Counterfeiter can eavesdrop any wireless communications between the reader and tags. read and write any tags’ memory. clone a tag’s memory to another one (cloned tag). find a tag with the phase fingerprint as same as the genuine one’s at a price.

Threat Model not recycle the tags from products and re-attach them on the forged product. His purpose is to pursue huge profits. There is no motivation for counterfeiter if the counterfeiting is unprofitable. The Counterfeiter can not

Workflow Consumer ❸ Validating Genuineness ❶ Fingerprint Tags Tag Provider Product Manufacture ❷ Fingerprinting genuineness

How to fingerprint tags? Over the domain of tag provider

Acquiring Phase Fingerprint How to acquire the phase fingerprint? How to automatically, fast, reliably and accurately measure the phase fingerprint?

Acquiring Phase Fingerprint Conveyor-style method

Acquiring Phase Fingerprint Nonlinear least square

Acquiring Phase Fingerprint

Randomness test The phase fingerprint follows the uniform distribution with 0.95 significance level.

Randomness test The reader takes impact on the phase fingerprint.

How to fingerprint genuineness? Over the domain of product manufacture

Challenges

Fingerprint a product Geometric constraint Acquisition constraint Private key checksum

How to validate genuineness? Over the domain of consumers

Hyperbola based Localization Geometric constraint

Hyperbola based Localization If we have three tags as reference, we can build two hyperbolas and their intersection is the location of the reader.

Unfortunately The measured phase difference contains the impact from the diversity!

Hyperbola based Localization Measured phase difference Diversity difference In details, the measured phase difference implicitly contains the diversity difference, while we store the real diversity difference in the tag’s memory. If two values are matched, the diversity influence can be eliminated.

Hyperbola based Localization The reader’s impact is removed by the difference Acquisition constraint

Validation Procedure

Discussion

How about the security?

Security analysis

How about the cost?

Cost analysis MethodCostSecurity TagPrint50~60 centshigh Serial based10 centslow Encryption based50 dollarsmiddle PUF based100 dollarshigh

Implementation & Evaluation

Evaluation

Classification rate

Evaluation Validation result 0.09% 0.12%

Impact of frequency

Impact of distance

Impact of antenna

Conclusion We exploit a new kind of fingerprint for a pair of reader and tag from their backscatter signals. A large-scale experiment involving 6,000 tags is performed to demonstrate the stability and randomness of phase fingerprint. We jointly utilize federated tags’ fingerprints and geometric relationships for the genuineness validation. Our approach is a totally offline solution without any communication between consumer and product manufacturer.

Questions? hank you T