Evan Welbourne University of Washington, Dept. of Computer Science & Engineering “ Radio Frequency Identification: What’s.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Mobile Computing and Commerce And Pervasive Computing
Emerging Threats, RF-ID and eCrime issues. Pascal Chauvaud 28/06/2006.
Configuration management
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
G53SEC 1 Hardware Security The (slightly) more tactile side of security.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
RFIDs and the Future Logistic System Dr. Hayden So Department of Electrical and Electronic Engineering 17 Sep, 2008.
The RFID Ecosystem Project Longitudinal Study of a Building-Scale RFID Ecosystem Evan Welbourne with Karl Koscher, Emad.
FIT3105 Smart card based authentication and identity management Lecture 4.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
The RFID Ecosystem Project Studying Next Generation RFID Applications in the Workplace Evan Welbourne University of Washington,
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
Applied Cryptography for Network Security
Privacy Research In the RFID Ecosystem Project Evan Welbourne joint work with Magdalena Balazinska, Gaetano Borriello, Tadayoshi.
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
RFID Cow Jewelry – or – Revolution Travis Sparks
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Created by the Community for the Community Building a RFID solution in BTS 09.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Radio Frequency IDentification RFID Technology Presented by Elaine Contant University of Arkansas Libraries – Fayetteville December, 2008.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Payment in Identity Federations David J. Lutz Universitaet Stuttgart.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Event Detection and Notification in the World-Wide Sensor Web Magdalena Balazinska with Evan Welbourne, Garret Cole, Nodira Khoussainova, Julie Letchner,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Computer Security By Duncan Hall.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
Internet of Things. Creating Our Future Together.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Probabilistic Data Management
Security and Privacy in Pervasive/Ubiquitous Computing Systems
- Dylan Leintz - Dr. Davies
Presentation transcript:

Evan Welbourne University of Washington, Dept. of Computer Science & Engineering “ Radio Frequency Identification: What’s RFID Doing in Your Life?” University of Alaska, Anchorage September 19, 2007

Radio Frequency Identification  Wireless identification and tracking  Information on:  Identity  Location  Time tagtimelocation ……… t1A t2B AB C t3C

Elements of an RFID System RFID ReaderRFID TagsReader Antenna Network Infrastructure Data Management System Applications

RFID Tags – A Wide Variety Consumer Item CasesPalletsTrucks Ships / Trains bar codes passive tags active tags GPS-enabled active tags Cost of tag (logarithmic)

RFID in the Supply-Chain

Today: Outside the Supply Chain

Tomorrow: Pervasive Computing  “Post-desktop era”, “Internet of Things”, “Third wave of computing”

Overview  RFID-based pervasive computing  The RFID Ecosystem project  Specific Applications  Research Challenges

Enabling “The Third Wave”  RFID is a key enabling technology  Cheap  Wireless  No batteries  Already pervasive  But there are many challenges!! mainframe era one-to-many PC era one-to-one pervasive computing era many-to-one 1960

 Create a microcosm of a world saturated with uniquely identifiable objects  100s of readers and antennas, 1000s of tags  Explore applications, systems, and social implications  Do it while there is still time to learn and adapt  Groups: Database, Security, Ubicomp, and others  Participants include: RFID Ecosystem at UW CSE Magdalena Balazinska Gaetano Borriello Garret Cole Nodira Khoussainova Tadayoshi Kohno Karl Koscher Travis Kriplean Caitlin Lustig Julie Letchner Vibhor Rastogi Chris Re Dan Suciu Justin Vincent-Foglesong Jordan Walke Evan Welbourne

Benefits: Home & Office  Management, information, assistance

Benefits: Healthcare  Use RFID to automatically monitor an elder’s activities  “Activity inference”  Intel Research

Overview  RFID-based pervasive computing  The RFID Ecosystem project  Specific Applications  Research Challenges

Research Challenges  Technology (Hardware) Challenges  Noisy, uncertain sensors  Limited sensor information  Data Management Challenges  “High fan-in” architecture produces a massive amount of data  Data must be “cleaned”  Uncertainty must be represented to applications  Inference and event detection for pervasive computing  Security and Privacy Challenges  Tags are on people and personal objects  Security on tags is often weak  How to manage sensitive information about individuals

Challenges: Technology  RFID is inherently unreliable  Missed and duplicate tag readings  Highly sensitive to environment  Handle at the data management level  RFID provides limited context  Identity, Time, Location only  Some applications need more! Intel Research’s WISP: Wireless Identification and Sensing Platform - Passive tags with limited sensing and computation - Acceleration, light

Challenges: Data Management  StreamClean: constraint-based RFID data stream cleaning  MystiQ: probabilistic database for managing uncertainty  Heuristics assign a probability to each tuple  Interpretation of probabilities passed on to application logic  PEEX: probabilistic event extractor  Specify events in SQL-like language  Detect complex events (“a meeting in room 405”) over RFID streams  Sophisticated learning machinery to improve accuracy

Challenges: Security & Privacy  Security: Protection against unauthorized access, use, disclosure, disruption, modification, or destruction  Privacy: Privacy in the collection and sharing of data  Roughly two areas of concern: 1) Security of reader-tag communication 2) Security and privacy of collected RFID data ( Rigorously defined and evaluated ) ( Definition and evaluation depends on human perception/interpretation )

Security of Tags and Readers Promise: Provides a faster, easier payment option Problem: Name, #, expiration sent as plaintext  $150 homemade device can steal and replay credit cards  Next generation of cards includes better security Promise: Faster border-crossings, improved security Problem: Identity, nationality sent in the clear  Malicious parties can easily identify / target U.S. citizens  Revised passport includes faraday shielding and BAC First generation RFID credit card vulnerabilities (UMass Amherst, RSA labs) Security and Privacy Risks of the U.S. e-Passport (UC Berkeley)

Security of Tags and Readers  Many attacks:  Crypto can improve security but…  Increases cost and power consumption, slows down read rate  and to be useful RFID tags have to be fast and cheap!  Physical security  Foil-lined wallet: works, but you have to remove your tag sometime  RFID Guardian: experimental device that jams readers, audits reads  Our approach:  Store little on tags, secure the EPC-PII link  Incorporate cryptographic techniques as they emerge  Skimming  Cloning  Replay attack  Eavesdropping  Ghost leech

Data Privacy and Security RFID and Contactless Smart Card Transit Fare Payment Promise: Streamlines transit experience and book keeping Problem: Massive databases with transit traces of individuals  Not entirely clear what data is private and how it can be used  Oyster card data is the new law enforcement tool in London  Increasing # of requests for Oyster data: 4 in all of in Jan ORCA Card: RFID-Based Transit Card for Seattle Area (August 2008) Promise: Streamlines transit experience and book keeping Integrated with easy pay and institutional partners Problem: The word “privacy” appears twice in 500 pages of early docs…

Data Privacy and Security  From RFID Ecosystem user studies:  “How do I know if I have a tag on me?”, “How do I opt out?”  Users must be carefully educated before consenting  There should be equal, available alternatives to the RFID option  If personal RFID data is stored:  Clearly define how each piece of information can and will be used  Define and enforce appropriate access control policies May depend on user, application, and context of use (PAC)  Formal data privacy techniques to further ensure privacy (K-anonymity) Store only the information you need, and add noise!  Provide users with direct access to and control of their data

Privacy & Security Discussion…  Just having an RFID tag could be a privacy risk  Pseudonymity not Anonymity  Each RFID tag you carry has a unique number  Sequential readings of your tags create a trace  Over time this trace can be used to identify you - “The person who: wears this sweater, takes this bus, uses this bus stop, shops at this grocery, …”  U.S. privacy law doesn’t consider these traces to be PII  European and Canadian law does a better job  Important to discuss these issues  RFID is increasingly ubiquitous, may be in the REAL ID cards

Thank you! Thanks! Questions?