High-Power Proxies for Enhancing RFID Privacy and Utility PETs Workshop June 1, 2005 Paul Syverson Naval Research Laboratory Joint work with Ari Juels,

Slides:



Advertisements
Similar presentations
SMUCSE 7349 RFID Security. SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War.
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Frank Stajano Presented by Patrick Davis 1.  Ubiquitous Computing ◦ Exact concept inception date is unknown ◦ Basically background computing in life.
G53SEC 1 Hardware Security The (slightly) more tactile side of security.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications.
Rafrex LLC - RFID Solutions
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Reusable Anonymous Return Channels
RFID: Security and Privacy for Five-Cent Computers Ari Juels Principal Research Scientist RSA Laboratories USENIX Security ¢5¢
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Security in RFID Presented By… NetSecurity-Spring07
J.J. Faxon Andy Vu Dustin Beck Jessica Bentz Mandi Ellis
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
1 Mon. December 3, 2001A Secure National ID Card Group 8 Chris Marinak Mike Cuvelier Adam Sowers Saud Bangash.
RFID tagging Stephanie Allen, Gina Calcaterra, Michael Gray, Rahul Nair, Sumit Pahwa, Edward Robertson MGT 6772.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
RFID Tags: Privacy and Security without Cryptography Ari Juels RFID-Privacy Workshop at MIT 15 November 2003.
Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories.
1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.
RFID Inventory Management And Tracking System Greg McDaniel Hashem Garner Adam Kesner Thomas Harris.
Khanh Huynh Project Leader Dat Tu Systems Analyst Sandy Fung Team Representative Patrick de Leon Lead Programmer Ching Fei Chan Documentation Specialist.
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
A C JOSHI LIBRARY A C Joshi Library is considered to be one of the best libraries of India: Annual budget approx 5 Crores Annual budget approx 5 Crores.
Network Security - IT653 Deepti Agrawal KReSIT, IIT Bombay
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
L.E.A. Data Technologies L.E.A. Data Technologies Introduction.
Data Capture and Sensing Evanna Agnew CBLT. AIDC Technologies Automatic Identification and Data Capture (AIDC)
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
University of Pennsylvania Electrical and Systems Engineering Department ABSTRACT: The last decade has seen the expansion of computer usage from scientific.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Daniel W. Engels, PhD Chief Technology Officer Revere Security.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels, Ronald Rivest, and Michael Szydlo ACM CCS, October 2003 Presented by Himanshu.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
Research Overview Nitesh Saxena Research areas: computer and network security, applied cryptography.
RFID SECURITY.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Lecture 14 Page 1 CS 111 Summer 2013 Security in Operating Systems: Basics CS 111 Operating Systems Peter Reiher.
RFID A technology I advocate, despite the disadvantages Will cover what it is, how it’s used, its advantages, and its bad side.
Fall 2006CS 395: Computer Security1 Key Management.
11/18/2003 Smart Card Authentication Mechanism Tim W. Baldridge, CISSP Marshall Space Flight Center Office of the Chief Information Officer.
Two Trends and Four Features from a Warehouse Perspective Melvin Fletcher.
Created by: Samantha Conrad.  What is an RFID?  Where did they come from?  Active tags vs. Passive tags  RFID Systems  Who uses these?  What’s in.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
Information Systems in Organizations 4.1 Supply Chain Management Systems.
Outline The basic authentication problem
English for Advance Learners I
Designing a Production Plan
What is a Radio-Frequency Identification (RFID) tag?
RFID & applications گردآوری: بیتا تدین
Revisting Unpredictability-Based RFID Privacy Models
Selective Blocking of RFID Tags for Consumer Privacy
Mobile Computing Lecture Materials By Bintang Eka Putera.
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

High-Power Proxies for Enhancing RFID Privacy and Utility PETs Workshop June 1, 2005 Paul Syverson Naval Research Laboratory Joint work with Ari Juels, Dan Bailey RSA Labs

Presentation Outline l Background on RFID l Security and privacy problems l Prior technical approaches l RFID Enhancer Proxy (REP) - Overview - Four components of REP managing an RFID tag - Preventing swapping attacks l Conclusions

What is a Radio-Frequency Identification (RFID) tag? Chip (IC) Antenna l In terms of appearance…

What is an RFID tag? l You may own a few RFID tags… - Proximity cards (contactless physical-access cards) - ExxonMobil Speedpass - EZ Pass l RFID in fact denotes a spectrum of devices:

l You may own a few RFID tags… - Proximity cards (contactless physical-access cards) - ExxonMobil Speedpass - EZ Pass l RFID in fact denotes a spectrum of devices: What is an RFID tag? SpeedPass Mobile phone EZ Pass Basic RFID Tag

l Characteristics: - Passive device – receives power from reader - Range of up to several meters - In effect a “smart label”: simply calls out its (unique) name and/or static data “74AB8” “5F8KJ3” “ Plastic #3” What is a basic RFID tag?

Capabilities of a basic RFID tag l Little memory - Static 64-to-128-bit identifier in current ultra-cheap generation (five cents / unit) - Hundreds of bits soon - Maybe writeable under good conditions l Little computational power - A few thousand gates - Static keys for read/write permission - No real cryptographic functions available

The grand vision: RFID as next-generation barcode Barcode RFID tag Line-of-sight Radio contact Specifies object type Uniquely specifies object Fast, automated scanning Provides pointer to database entry for every object, i.e., unique, detailed history. Possibly rewritable.

Some applications l Better supply-chain visibility -- #1 commercial app l Theft prevention l Govt.uses: DHS: Passports, FDA: Pharmaceuticals, Defense: Badging, Inventory, Supply (ordinary materials, munitions, hazardous materials). l Libraries l Housepets – approx. 50 million l Parenting logistics - Water-park with tracking bracelet l RFID in Euro banknotes (?)

There is an impending explosion in RFID-tag use l Wal-Mart requiring top 100 suppliers to start deploying RFID in 2005 l Other retailers and US DoD following Wal-Mart lead l Pallet and case tagging first -- item-level retail tagging seems years away l Estimated costs +2005: $0.05 per tag; hundreds of dollars per reader +2008: $0.01 per tag; several dollars per reader (?) l A broader vision: “Extended Internet”

RFID means a world with billions of ant-sized, five-cent computers l Highly mobile l Contain personal and/or sensitive information l Subject to surreptitious scanning l Again, no cryptography… - Access control difficult to achieve - Data privacy difficult to achieve

Presentation Outline l Background on RFID l Security and privacy problems l Prior technical approaches l RFID Enhancer Proxy (REP) - Overview - Four components of REP managing an RFID tag - Preventing swapping attacks l Conclusions

1500 Euros in wallet Serial numbers: , … Wig model #4456 (cheap polyester) 30 items of lingerie Das Kapital and Communist- party handbook Replacement hip medical part # The consumer privacy problem Here’s Mr. Jones in 2020…

Government and Corporate Security Problems l Espionage: Privacy is not just a consumer issue - Eavesdropping on warehouse transmissions - Scanning of shelves for turnover rates l Tag counterfeiting - Automation means dependence! l Special demands of U.S. Department of Defense - “DoD would be like Wal-Mart… if Christmas were a random event every five years, and a stockout meant that everyone in the store could die…” -Nicholas Tsougas, DoD

Some proposed solutions to the privacy problem

Approach 1: Cover RFID tags with protective mesh or foil Problem: Makes locomotion difficult

Problem: RFID tags are much too useful in “live” state… Approach 2: “Kill” RFID tags We already have SpeedPass, etc., and then…

Tomorrow’s consumer applications l Tagged products - Clothing, appliances, CDs, etc. tagged for store returns, locatable in house (lost your keys, cordless phone, etc.), replacement parts l “Smart” appliances - Refrigerators: auto create shopping lists, say when milk expires - Washing machines that detect proper wash cycle l “Smart” print - Airline tickets that indicate your location in the airport - Business cards l Aids for cognitively impaired, e.g., “smart” medicine cabinets - Project at Intel l Recycling - Plastics that sort themselves Consumers will not want their tags “killed,” but should still have a right to privacy!

l Undoutedly helpful if thought through well, but… Approach 3: Policy and legislation l Retailer’s guarantee means little: tags may be read by anyone! l FTC Section 5 (“Deceptive practices”) and the like are similarly limited l “Good Housekeeping” seal

Another possible use of RFID More efficient mugging “Just in case you want to know, she’s got 700 Euro and a Rolex…” Whom will the FTC prosecute now? “and a US govt. ‘Official’ Passport” And won’t help for national security issues

Presentation Outline l Background on RFID l Security and privacy problems l Prior technical approaches l RFID Enhancer Proxy (REP) - Overview - Four parts of a REP managing an RFID tag - Preventing swapping attacks l Conclusions

Welcome to Hell IT Department Cryptographers’ view of device security – emphasis on “oracle” access

Welcome to Hell IT Department A basic RFID tag cannot survive…

For RFID, can have different and weakened adversarial assumptions l Adversary is not present 24 hours a day - Adversary must be physically close to tag to scan it l We can deploy security protocols on physical channels – not just logical ones l External, higher-capability devices can help protect tags

Will not discuss,,, l Minimalist Crypto [Juels SCN04] l Approaches using even lightweight hashing or MACs [Juels PerSec04] l Encryption (except perhaps XOR) l Basically, anything that assumes tags that are more powerful than today (even at the same cost)

“Blocker” Tag Blocker simulates all (billions of) possible tag serial numbers!! 1,2,3, …, 2023 pairs of sneakers and… (reading fails)… [Juels, Rivest, & Szydlo CCS ‘03]:

Two bottles of Merlot # Blocker tag system should protect privacy but still avoid blocking unpurchased items

Selective Blocking l Privacy zones: Only block certain ranges of RFID-tag serial numbers l Zone mobility: Allow shops to move items into privacy zone upon purchase

Polite blocking l Requests that the reader not scan in the privacy zone Your humble servant requests that you not scan the privacy zone

“Soft” Blocking l Idea: Implement polite blocking only – no hardware blocking - A little like P3P… l Advantages: - “Soft blocker” tag is an ordinary RFID tag - Flexible policy: +“Opt-in” now possible +e.g., “Medical deblocker” now possible l Weaker privacy, but can combine with “hard” blocker [Juels and Brainard WPES ‘04]

Universal Re-encryption [Golle, Jakobsson, Juels, Syverson, CT-RSA04] Recall Mr. Jones

Privacy via Universal Re-encryption Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Universal encryption with public key at stores

Privacy via Universal Re-encryption Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Universal encryption with public key at stores Universal Re-encryption walking past RF mix

Privacy via Universal Re-encryption Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) 500 Euros in wallet Serial numbers: ,389473… Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) 500 Euros in wallet Serial numbers: ,389473… Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Universal encryption with public key at stores Universal Re-encryption walking past RF mix New Purchase (after encryption)

Privacy via Universal Re-encryption Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) 500 Euros in wallet Serial numbers: ,389473… Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) 500 Euros in wallet Serial numbers: ,389473… Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) 500 Euros in wallet Serial numbers: ,389473… Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) 500 Euros in wallet Serial numbers: ,389473… Wig model #4456 (cheap polyester) 30 items of lingerie DasKapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) ester) 30 items of lingerie Das Kapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) 500 Euros in wallet Serial numbers: , ノ Wig model #4456 (cheap polyester) 30 items of lingerie Das Kapital (paid with Amex card ) Pack of cigarettes (fourth pack this week) Universal encryption with public key at stores Universal Re-encryption walking past RF mix Decryption with private key (Returning home or as needed) New Purchase (after encryption)

Limitations of Previous Approaches l Blocker Tag: - Prevents reading of all tags in area irrespective of owner l Polite/Soft Blocking: - Does not protect against “impolite” readers - Requires specialized modified readers - Does not protect against tracking l Universal Re-encryption: - Does not protect against unauthorized modification such as Swapping Attacks

Presentation Outline l Background on RFID l Security and privacy problems l Prior technical approaches l RFID Enhancer Proxy (REP) - Overview - Four parts of a REP managing an RFID tag - Preventing swapping attacks l Conclusions

REP (RFID Enhancer Proxy) l Main Idea: REP represents the tag in interactions with readers - Small high-power device, often carried on your person - Hides tag values - Changes tag appearance to prevent tracking - Simulates and enhances tag signal for weak or distant readers - Basically all the functionality of previous approaches (and more) without the drawbacks

Your personal REP l Could be incorporated in other devices l Nokia offers mobile phone RFID kits since 2004 l Example applications quoted from Nokia RFID kit site - Service Professional: Touch the item to be serviced and you will get up to date service information. - Security: Attach tags to sites that are visited by security guards. Get accurate time stamps and proof of work done. - Visual Phone Directories: Attach a tag behind a person's photo to initiate a call to them. Simplify making phone calls for those not used to mobile phones or those who have physical limitations. Create personal directory for children or the elderly. - Distress Assistance: Touch a tag on your clothing such as a belt, and the phone initiates an emergency call.

REP Actions l Tag Acquisition l Tag Relabeling l Tag Simulation l Tag Release

REP Actions: Tag Acquistion l Tag data transferred directly to REP - At shop checkout via Bluetooth - In supply chain via IrDA, Bluetooth, ZigBee l Tag data could be acquired out of band on authenticated channels - Keys could be barcoded on tag for optical scan - Resurrected Duckling paradigm (physical contact restores acquired state)

REP Actions: Tag Relabeling l During time interval t REP assigns k-bit pseudonym p t,i to tag i l Integrity Problem: Anyone can relabel tag to any value l Can authenticate writes with pseudonym: REP  i: p t-1, i

Attacking Integrity of Tag Relabeling l Adversary Eve can eavesdrop on high power signal from REP to tag (forward channel) l Could, e.g., use PIN exchanged during tag acquisition to protect new writes During interval t-1, REP  i: p t-1, i XOR PIN During interval t, REP  i: p t-1, i l Eve in forward range during t-1, t learns PIN

Attacking Integrity of Tag Relabeling (2) l Can play games with only sending PIN in clear on lower power back channel (tag to REP) l Eve in forward channel range for two intervals and back channel range for one gets PIN and/or pseudonym

Attacking(?) Integrity of Tag Relabeling l So what? l At worst the result is Denial of Service, - No confidential information is leaked to attacker l Tags are no longer being relabeled: trackable l Beeper or light on REP can alert owner to acquisition loss l Owner can reaquire the tag by inspection

R27v489vQp5 Z4m85689h7Q R27v489vQp5 Z4m85689h7Q Swapping Attack: Courier delivering parts with encrypted tags

ACME Terrestrial Training Spacesuit seal WARNING: Not for use in space ACME High Quality Spacesuit seal R27v489vQp5 Z4m85689h7Q Swapping Attack Courier arrives at supply depot Tags are decrypted

Houston, we have a problem

Preventing Swapping l Tags can generate small amount of randomness l Tags can dictate (part of) their next pseudonym l Only accept a pseudonym that matches on the tag generated part l Will that work?

Example l Suppose a pallet with 100 tags l Tags relabeled once per minute l Suppose tag can generate 32-bit nonce l Adversary attacking persistently for a day (1440 minutes) has probability of successful swapping attack = (1- (1 - 99/2 32 ) x 1440 <

Tag simulation l REP has higher send/receive power than tags l Can simulate tags in unfavorable environments - warehouse with metal drums of liquid, etc. - what is inside shipping container it is on outside of l Can communicate with farther readers l Can communicate with different type devices

Tag simulation (2) l REP has higher computational power than tags - REP can store and manage much more information about items than tags - REP can have much more sophisticated policy for managing item information

Tag simulation examples l Tag can simulate Patek Philippe watch while in upscale shops, otherwise it’s a Timex l Can easily acquire and carry info about your fridge to get parts or match pattern, color at appliance store l Can simulate nonexistent inventory or not simulate present inventory to complicate stock espionage l Could become a blocker tag or dynamically obfuscatory if it detects unauthorized activity, - e.g., readers should do inventory at some known (secret?) schedule

Tag release l When item is left home, sold to customer, etc. REP will release tag, restore state l May want to restore “property bits”, but not unique identifier bits - E.g., 100g bar of Toblerone chocolate, but not candy bar # 3e84a7c25, l May want to restore identity bits - E.g., a specific copy of a book returned to library - E.g., if an item’s warranty is tied to serial number

How to know when to release Tags l Environmental cues: - House system tells REP “You’re home now REP. Lay down your burden and release your tags.” l Item is sold: - Cashier touches it to/waves it near release device l Detect loss of control: - By varying power, REP can determine that item is moving away and release it while it can

Conclusions l RFIDs are coming… with big privacy/security problems l Introduced REP: a device that renders RFID tags effectively dormant and simulates them to other devices - Improves security and privacy of RFID tag use - Requires no specialized tags or tag readers l First effective mechanism against swapping attacks on writable simple tags