Security in RFID Presented By… NetSecurity-Spring07

Slides:



Advertisements
Similar presentations
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Advertisements

The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
FIT3105 Smart card based authentication and identity management Lecture 4.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Risk of Using RFID chips in Passports Oscar Mendez.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
YA-TRAP: Yet Another Trivial RFID Authentication Protocol Gene Tsudik International Conference on Pervasive Computing and Communications, PerCom 2006.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
- 1 - Secure and Serverless RFID Authentication and Search Protocols Chiu C. Tan, Bo Sheng, and Qun Li IEEE Transactions on Wireless Communication APRIL.
Authentication Approaches over Internet Jia Li
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
1 Ch. 17: Security of RFID slide 1. 2 Roles of RFID applications slide 2 TagsReaderServer(Database) Secure channel Slides modified from presentation by.
Radio Frequency IDentification RFID Technology Presented by Elaine Contant University of Arkansas Libraries – Fayetteville December, 2008.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Network Security - IT653 Deepti Agrawal KReSIT, IIT Bombay
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Chapter 21 Distributed System Security Copyright © 2008.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
WEP Protocol Weaknesses and Vulnerabilities
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels, Ronald Rivest, and Michael Szydlo ACM CCS, October 2003 Presented by Himanshu.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
RFID SECURITY.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
CSCE 201 Identification and Authentication Fall 2015.
Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers Author : Dirk Henrici and Paul Muller.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Information Systems Design and Development Security Precautions Computing Science.
RFID TAG READER TAG READER Abdullah Al-Faifi ) ) ) ) )
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Radio Frequency Identification (RFID)
Security in Networking
Team 7 Technical Presentation
Revisting Unpredictability-Based RFID Privacy Models
Anuradha Jambunathan – Computer Security Seminar BIT WS 06/07
Radio Frequency Identification
Selective Blocking of RFID Tags for Consumer Privacy
Presentation transcript:

Security in RFID Presented By… NetSecurity-Spring07 Vamsikrishna Ambati Kokil Bhalerao Chandra S.Cheruku HariPriya Chintalapati NagaKalyani Padakanti Shveta Shahi

Presentation Objectives What is RFID?? RFID System Components Architecture Applications Security Issues and Challenges …… Conclusion

What is RFID ?? RFID (Radio Frequency Identification) uses a micro-chip in a tag to transmit stored data when the tag is exposed to radio waves of the correct frequency. System of tags, readers, antennas, and software. Tag wirelessly sends bits of data when it is triggered by a reader. Reader transmits radio frequency energy Provides power for the tag. Enables communications to and from the tag. Different operating frequencies are possible.

RFID System Architecture… RFID systems are composed of three key components.. The RFID tag, or transponder, carries object identifying data. The RFID tag reader, or transceiver, reads and writes tag data. • The back-end database stores records associated with tag contents.

RFID Tags.. Antenna Active Passive Tags can be active or passive. Passive RFID Active RFID Tag Battery No Yes Availability of power Only in field of reader Continuous Signal Strength Very High Very Low Range Up to 3-5m Up to 100m Antenna Active Passive

RFID Applications.. Personal Productivity Automatic toll collection Ticketing and event access Library checkout Other Applications Automobile Keyless entry E-Passport

RFID Challenges.. The Privacy Problem Security Reader Collision Wig model # 143 (cheap polyester) The Privacy Problem Hacking BOA $ 1000 in wallet 30 Items of candies Security Reader Collision Tag Collision Signal Interference in noise Inconsistent data

RFID Security Issues User Privacy Replay Attack Virus Injection Denial of service Tag Cloning

User Privacy Replay Attack Security Concern with replay attack: Few concerns related to user privacy Products labeled with insecure tags may reveal sensitive information. Location privacy violation which may lead to tracking of individual by the tags they carry. Replay Attack RFID passport have signed biometric stored in RFID chip. When there read request it just return the stored value. This signal can be captured and a device can be made to replay the same signal which may seem to come from valid RFID passport. Security Concern with replay attack:

Virus Injection Denial Of Service Concerns with virus injection: Virus can be injected while data is in transit Concerns with virus injection: Tags scanned after the database is infected can also be infected with the virus. A malicious activity like dropping database tables is possible. Denial Of Service Concerns with denial of service: Thieves could remove tags or put in foil-lined booster bag that will block RFID reader’s request and temporarily deactivate the tag. An attacker could attach RFID on other items causing RFID system to record useless data which will flood an RFID system with more data then it can handle.

Tag Cloning Few security concerns Ability to spoof tags to overwrite the data in tags, overwrite the tag ID. A data integrity attack. Few security concerns Replace the tag for an expensive item with the tag of cheaper item. Switching two books’ RFID data or changing the security status of the tags.

Solutions to security issues Kill Tag Smart RFID Tag Blocker Tag DST Tag Authentication Protocol Simplified Authentication protocol Enhanced Authentication protocol

The Kill Tag Approach…. Used to protect consumer privacy. The RFID tag of the object is killed by sending a special ‘kill’ command to the tag. A killed tag can never be reactivated. Example: An RFID tag is killed by check out clerk before the object is given to customer. Drawback: It is undesirable in many environments. Many applications require the tag to be active even after purchase.

Hash Lock: Locking protocol Smart RFID Tags Protect consumer privacy while RFID tag remains active. Types of smart RFID tag: Hash Lock Approach…. Simple access control mechanism based on one way hash function. Randomization Hash Lock Approach…. Similar to hash lock but a random number generator is also embedded along with one way hash function. Hash Lock: Locking protocol Reader R selects a random key and computes metaID = hash(key). R writes metaID to tag T. T enters the locked state. R stores the pair(metaID, key) locally.

Hash Lock Approach: unlock database query Reader Tag metaID metaID (key,metaID) Key ID Strength of Hash lock Approach Prevent unauthorized reader from reading the tag because of one-wayness of hash Weakness of Hash lock Approach The unauthorized reader can keep track of tag using metaID.

Randomized Hash lock: unlock database query Reader Tag Get all ID’s R,h(IDk||R) ID1, ID2….IDk IDk Strength of Randomized Hash lock Approach Address the problem of tracking tags by their metaID Weakness of Randomized Hash lock Approach Impractical for reader with large number of ID’s

Digital Signature Transponder Blocker Tag.. A blocker tag prevents RFID tags from being read RFID reader can read one tag at a time Reader will unable to read information if more than one tag responses A blocker tag takes advantage of this technique to block the reader When a reader try to read a tag belonging to a privacy zone, then the blocker tag confuses the reader by always responding This way, blocker tag blocks any tag from being read. Weakness of Blocker tag It can be used as malicious tool. Digital Signature Transponder It uses cryptographic mechanism in wireless authentication applications It acts as a passive transponder and implements a challenge-response authentication using block cipher A DST tag contains non-volatile RAM to store 40-bit encryption key.

DST algorithm Reader (40-bit encrypt. Key) 1.40-bit challenge Tag 2. Encipher to 40-bit Cipher text 3. Truncates to 24-bit response 4. 24-bit response 5. Calculates expected challenge 6. Compares calculated challenge with tag response

Simplified Authentication Protocol ID h(ID) XXX yyy aaa bbb Request h(IDi), N, hIDi (N) Tag Reader Strength of Simplified Authentication Protocol Provides protection against tracking, tag cloning and it also provides forward security. Weakness of Simplified Authentication Protocol Replay Attack Database De-synchronization

Enhanced Authentication Protocol Request,NR ID h(ID) XXX yyy aaa bbb H(Idi),NT,hIDi(NT,NR) hIDi+1(NT,NR) Tag Strength of Enhanced Authentication Protocol Reader Tag cannot be attacked because if attacker is masquerading as reader then he will not know the shared secret which is ID of the tag. Reader cannot be attacked because of the shared secret. Which protects against replay and database de-synchronization attack. The communication between tag and reader cannot be attacked because of one-way of hash. User privacy cannot be attacked because no identity is released by the tag. Location privacy cannot be attacked because ID value changes with every read.

Conclusion RFID definitely has some security issues that need to be addressed. According to latest report from Texas Instruments there is no fraud reported with DST approach in last eight years. In enhanced authentication protocol, both reader and tag are authenticated by each other. Enhanced authentication protocol is most secure solution and uptill now we didn’t identify any weakness associated with this protocol.

References http://www.rfidjournal.com/article/articleview/549/1/1/ http://en.wikipedia.org/wiki/Digital_Signature_Transponder Stephens August Weis, " Security and Privacy in Radio-Frequency Identification Devices” Ari Juels and Ronald L. Rivest and Michael Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy”

Any Questions Thank U………..