#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.

Slides:



Advertisements
Similar presentations
Made Harta Dwijaksara Park, Yi Jae
Advertisements

SMUCSE 7349 RFID Security. SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War.
Mitigate Unauthorized Tracking in RFID Discovery Service Qiang Yan 1, Robert H. Deng 1, Zheng Yan 2, Yingjiu Li 1, Tieyan Li 3 1 Singapore Management University,
A Survey of Key Management for Secure Group Communications Celia Li.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Reusable Anonymous Return Channels
Computer Security Key Management
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
FIT3105 Smart card based authentication and identity management Lecture 4.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Security in RFID Presented By… NetSecurity-Spring07
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
YA-TRAP: Yet Another Trivial RFID Authentication Protocol Gene Tsudik International Conference on Pervasive Computing and Communications, PerCom 2006.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
1 Cryptographically Strong Pseudorandom Functions and Their Applications 陳昱升 碩士學位論文 中興大學 資訊科學系 2006 年 6 月.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
Diffie-Hellman Key Exchange
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
- 1 - Secure and Serverless RFID Authentication and Search Protocols Chiu C. Tan, Bo Sheng, and Qun Li IEEE Transactions on Wireless Communication APRIL.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
RFID Security without Extensive Cryptography Sindhu Karthikeyan Mikhail Nesterenko Kent State University SASN November 07, 2005.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
RFID Payment Terminal Presented by: Rohit Kale. Introduction RFID: an automatic identification method, relying on storing and remotely retrieving data.
EPCglobal Network Security: Research Challenges and Solutions Yingjiu Li Assistant Professor School of Information Systems Singapore Management University.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
1 KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS J. G. Steiner, C. Neuman, J. I. Schiller MIT.
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical.
Chapter 14 Network Encryption
RFID SECURITY.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Dan Boneh Basic key exchange Trusted 3 rd parties Online Cryptography Course Dan Boneh.
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers Author : Dirk Henrici and Paul Muller.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Security of the Internet of Things: perspectives and challenges
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
What is a Radio-Frequency Identification (RFID) tag?
Privacy for Public Transportation
Randomized PRF Tree Walking Algorithm for Secure RFID
Presentation transcript:

#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels

#2 The tide is turning... Pervasive computing is coming... It’s time to get serious about privacy.

#3 RFID and identification systems Protocols for private identification The challenge of scalability; trees of secrets Outline

#4 Example applications: Electronic passports ID cards and badges Proximity cards, building access control Automatic payment systems (Fastrak, EZPass) Item tagging & tracking, inventory management Key technologies: RFID Contactless smart card Identification systems Challenge: privacy (and security) for ID systems

#5 RFID tags are passive, powered by reader, carry identity Privacy issues: Unwanted tracking of people and items Introduction to RFID Power Identity Reader Tag

#6 Tags might lack writable non-volatile memory Takes more energy to permanently write bits Thus, state might only last as long as tag is powered Cryptography is expensive Public-key out of reach for all but priciest tags AES within reach for mid-class tags? [Feldhofer] Can’t take random number generation for granted Readers might not be network-connected RFID systems are resource-limited

#7 Intended read range  Computation  ISO E-passports, ID cards US$5 ISO Library books US$0.50 EPC WalMart US$ cm 3DES, RSA sym.-key crypto no crypto 1m3m RFID technologies vary widely

#8 normal reader (10cm / 3m) malicious reader (50cm / 15m) eavesdrop on tag (???) Read range? eavesdrop on reader (50m / ???)

#9 Simple trick: Defeating eavesdropping on forward link r m  r “go ahead” wants to send m picks random r Appears in EPC Gen II standards.

#10 A first attempt at defeating eavesdropping and unauthorized tag-reading E k (r, ID) k k “pseudonym” Problem: All tags and readers share the same key k If any tag is compromised, all security is lost If any reader is compromised, all security is lost Risk: Massive data spills.

#11 Take #2: Independently keyed tags r, F ki (r) Scans through all keys to decode kiki “pseudonym” Problem: Doesn’t scale. Takes O(N) work to decode each pseudonym (k 1, ID 1 ) : (k N, ID N )

#12 Private identification protocols Goal: a tag reader protocol, providing: Identification: Authorized reader learns tag’s identity Privacy: Unauthorized readers learn nothing Attacker cannot even link two sightings of same tag Authentication: Tag identity cannot be spoofed Scalability: Can be used with many tags A non-trivial technical challenge, with many possible applications.

#13 A beautiful method for private identification r, F k i (r), F k ij (r) k i, k ij pseudonym More scalable: O(√N) work to decode each pseudonym First, scan all k i to learn i Then, scan all k ij to learn j and thus tag identity : (k i, i) : (i, k ij, ID ij ) : Decodes i, then j

#14 The tree of secrets Tag  leaf of the tree. Each tag receives the keys on path from leaf to the root. Tag ij generates pseudonyms as (r, F k i (r), F k ij (r)). Reader can decode pseudonym using a depth-first search. k0k0 k 00 k 01 k0k0 k 00 k 01 k1k1 k 10 k 11

#15 Analysis: tree of secrets Generalizations: Use any depth tree (e.g., lg N) Use any branching factor (e.g., 2 10 ) Use any other identification scheme (e.g., mutual auth) TheoryA concrete example Number of tags: N 2 20 tags Tag storage:O(lg N) 128 bits Tag work:O(lg N)2 PRF invocations Communications:O(lg N) 138 bits Reader work:O(lg N)2  2 10 PRF invocations Privacy degrades gracefully if tags are compromised

#16 Reducing trust in readers r, F k i (r), F k ij (r) k i, k ij If readers are online, Trusted Center can do decoding for them, and enforce a privacy policy for each tag. No keys stored at reader => less chance of privacy spills. Trusted Center r, F k i (r), F k ij (r) ID ij Reader  (k ij, Policy ij ) 

#17 Reducing trust: Delegation r, F k i (r), F k ij (r) k i, k ij For offline or partially disconnected readers, can delegate power to decode pseudonyms for a single tag to designated readers. Reader workload: O(D) per pseudonym, where D = # of tags delegated to this reader. Trusted Center ID ij k ij  (k ij, Policy ij )  k ij

#18 Time-limited delegation pseudonym ctr, k i, k ij Trusted Center ID ij, L, R {keys} Only good for decoding L-th through R-th pseudonyms from tag ID ij Even less trust: Reader gets access to the next 100 pseudonyms from this tag (say), and nothing more.

#19 k 0000 Enabling time-limited delegation Use GGM at lower levels: (k s0, k s1 ) = G(k s ) Tag uses leaves sequentially Reader gets keys for a subset k0k0 k 00 k 01 k0k0 k 00 k 01 k1k1 k 10 k 11 k 000 k 0001 k 0010 k 0011 k 001

#20 Identification systems: an exciting research area Privacy is central Many non-trivial technical challenges, many opportunities for clever solutions There’s still time to have an impact on deployments Research question: Private identification protocols Tree schemes have useful properties Can we do better? Can do without persistent state? Recent work: Controlling readers with Trusted Computing (to appear at WPES’05) Conclusions