Privacy Research In the RFID Ecosystem Project Evan Welbourne joint work with Magdalena Balazinska, Gaetano Borriello, Tadayoshi.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Provenance-Aware Storage Systems Margo Seltzer April 29, 2005.
User Care Preference-based Service Discovery in a Ubiquitous Environments Dongpil Kwak, Joongsoo Lee, Dohyun Kim, and Younghee Lee Talk by Joongsoo Lee.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
The RFID Ecosystem Project Longitudinal Study of a Building-Scale RFID Ecosystem Evan Welbourne with Karl Koscher, Emad.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Design and Implementation of a Middleware for Sentient Spaces Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyue Ji, Daniel Massaguer Sharad Mehrotra,
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
The RFID Ecosystem Project Studying Next Generation RFID Applications in the Workplace Evan Welbourne University of Washington,
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke L3S Research.
Evan Welbourne University of Washington, Dept. of Computer Science & Engineering “ Radio Frequency Identification: What’s.
Privacy Issues and Techniques for Monitoring Applications Vibhor Rastogi RFID Security Group.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Privacy Preserving Data Mining: An Overview and Examination of Euclidean Distance Preserving Data Transformation Chris Giannella cgiannel AT acm DOT org.
RFID Cardinality Estimation with Blocker Tags
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
SEC835 Database and Web application security Information Security Architecture.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno,
Cryptography and Network Security
Threats, Risk Assessment, and Policy Management in UbiComp Workshop on Security in UbiComp UBICOMP 2002, 29th Sept. Göteborg, Sweden Philip Robinson, SAP.
Cryptography, Authentication and Digital Signatures
SixthSense RFID based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan Interns: Piyush Agrawal (IITK), SriKrishna (BITS Pilani)
University of Pennsylvania Electrical and Systems Engineering Department ABSTRACT: The last decade has seen the expansion of computer usage from scientific.
Semantic Web and Policy Workshop Panel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
By Swetha Namburi.  Trust  Trust Model ◦ Reputation-based Systems ◦ Architectural Approach to Decentralized Trust Management.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Illinois Security Lab Privacy Sensitive Location Information Systems in Smart Buildings Jodie P. Boyer, Kaijun Tan, Carl A. Gunter Midwest Security Workshop,
Special Education 101 Elementary Dept. Chair 1/27/2009 Confidentiality.
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Institute for Security Technology Studies Dartmouth College Digital Living 2010: Sensors, Privacy, and Trust David Kotz September 2005.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Trust Me, I’m Partially Right: Incremental Visualization Lets Analysts Explore Large Datasets Faster Shengliang Dai.
Assistant Professor - University of Washington PhD from MIT in February 2006 Advisors: Hari Balakrishnan and Mike Stonebraker Topic: distributed stream.
Chapter 10. The Explorer System in Cognitive Systems, Christensen et al. Course: Robots Learning from Humans On, Kyoung-Woon Biointelligence Laboratory.
Event Detection and Notification in the World-Wide Sensor Web Magdalena Balazinska with Evan Welbourne, Garret Cole, Nodira Khoussainova, Julie Letchner,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
NETWORKING & SYSTEM UPDATES
ITU K ALEIDOSCOPE 2013 October 18, 2012 G RIFFIN – A PRIL 2013 IEEE Global Communications 2015 Conference IoTAAL Workshop - Sunday, December 6, 2015 Security.
An Ontology-based Approach to Context Modeling and Reasoning in Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire INSA de Lyon,
Computer Science and Engineering 1 Mobile Computing and Security.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Inference Problem Privacy Preserving Data Mining.
Personal data protection in research projects
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Tracking Indoors.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Add video notes to lecture
COMPUTER SECURITY CONCEPTS
UbiComp EdTech DevWorld
Probabilistic Data Management
CAE: A Collusion Attack against Privacy-preserving Data Aggregation Schemes Wei Yang University of Science and Technology of China (USTC) Contact Me.
Privacy for Public Transportation
Overview of Database Security
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

Privacy Research In the RFID Ecosystem Project Evan Welbourne joint work with Magdalena Balazinska, Gaetano Borriello, Tadayoshi Kohno, Dan Suciu Nodira Khoussainova, Karl Koscher, Travis Kriplean, Julie Letchner, Vibhor Rastogi University of Washington, Dept. of Computer Science & Engineering RFID CUSP Workshop John’s Hopkins University, Baltimore January 24, 2008

Defining Security & Privacy  Security: Protection against unauthorized access, use, disclosure, disruption, modification, or destruction  Privacy: Privacy in the collection and sharing of data  Roughly two areas of concern: 1) Security of reader-tag communication 2) Security and privacy of collected RFID data ( Rigorously defined and evaluated ) ( Definition and evaluation depends on human perception/interpretation )

Outline  Overview of the RFID Ecosystem  Organize privacy concerns  Recent focus: Peer-to-Peer privacy  Designing a default policy  Implementing the policy  Extensions for probabilistic data  Techniques for detecting and preventing violations

Today: Outside the Supply Chain  Subpoenas for EZ-Pass data  Insecurities in first version of e-Passport  Insecurities in first-generation RFID credit cards  Cloning RFID access control badge  Dutch transit card hack

Tomorrow: User-Centered RFID Systems  User-centered, pervasive RFID Applications  “How do I know if I am wearing a tag?”  “How do I know who can see me?”  “How can I control who can see me?”  “Who owns the data? Can I remove/edit my data?”  “What is the lifetime of the data?”

Laboratory Everyday Life From the Lab to the Real World

 Create a microcosm of a world saturated with uniquely identifiable objects  100s of readers and antennas, 1000s of tags  Explore applications, systems, and social implications  Do it while there is still time to learn and adapt  Groups: Database, Security, Ubicomp, and others  Participants include: RFID Ecosystem at UW CSE Magdalena Balazinska Yang Li Nodira Khoussainova Julie Letchner Gaetano Borriello Dan Suciu Karl Koscher Vibhor Rastogi Tadayoshi Kohno Travis Kriplean Evan Welbourne 14 undergraduate researchers over the past 2 years

RFID Ecosystem Video [ Show First RFID Ecosystem Demo Video ] [ ] OR [ ]

RFID Ecosystem at UW CSE

Outline Overview of the RFID Ecosystem  Organize privacy concerns  Recent focus: Peer-to-Peer privacy  Designing a default policy  Implementing the policy  Extensions for probabilistic data  Techniques for detecting and preventing violations [Kriplean, Rastogi, Welbourne and others] }

 Modes of information disclosure:  Institutional  Organization collects, uses, and shares personal data  Addressed by contracts, federal law, corporate practice (e.g. FIPs)  Peer-to-Peer or “Mediated”  Peers and superiors access data through some authorized channel  Mediated by access control policies  Malicious  Personal data is compromised by unauthorized parties  Addressed by secure systems engineering Organizing Privacy Concerns

 Modes of information disclosure:  Institutional  Organization collects, uses, and shares personal data  Addressed by contracts, federal law, corporate practice (e.g. FIPS)  Peer-to-Peer or “Mediated”  Peers and superiors access data through some authorized channel  Mediated by access control policies  Malicious  Personal information is compromised by un authorized parties  Addresses by secure systems engineering Organizing Privacy Concerns

A Key Problem in Peer-to-Peer Privacy  The Panopticon  Key problem: asymmetric visibility Image credit: Prison building at Presidio Modelo, Isla De Juventud, Cuba (Wikipedia)

 Privacy vs. Utility:  What information to disclose by default?  Who to disclose information to by default?  How to support applications and preserve privacy?  How to detect and prevent violations? A Key Problem in Peer-to-Peer Privacy Image: Paul G. Allen Center for Computer Science & Engineering, Seattle, WA

Default Policy: Physical Access Control  “Socially appropriate access control” - Kriplean  Concept:  Each user has a personal data store (or personal view of the data)  Store contains events that occurred when and where the user was physically present  Requirements:  Each user carries a personal tag  Line-of-sight information between each pair of antennas is known and static  Key points:  Provides symmetric visibility  Models sense of sight  Enables applications which augment user’s memory

sightingstimestampsightingstimestampsightingstimestamp Time:0 ’s data store

Implementing PAC with RFID  Tag Read Event (TRE): (tag id, antenna id, timestamp)  Mutual Visibility: When 2 TREs instantaneously share an unobstructed line-of-sight  Practical Definition of Mutual Visibility: 1) TREs occur within some time window Δ of each other 2a) TREs are read by the same antenna or 2b) The reading antennas are considered mutually visible

Challenge: Inaccurate Model  Some problems with model:  360° vision  Perfect observations in complex/crowded situations  Perfect, everlasting memory  Second two could be dealt with…

Challenge: Imperfect Deployment  The physics of a real RFID deployment may not match up  Antenna read-range may not be clearly defined  In our deployment it works out… [Kriplean, Welbourne, et al. 2007]  But RFID is noisy and uncertain  Data is really probabilistic!  Microbenchmarks  Δ = 1 sec, mv = geometry  Colocations per second  Few false positives  Most colocations detected

- antenna Challenge: Uncertain Data ? ? ?? ??? ??? ? ? ? ?  Uncertainty in data: Where did Alice go? - Alice  Each possible location is assigned a probability ? ? ?

Assigning Probabilities: Particle Filter  [Particle Filter Movie]  Assigns a probability to each location  Incorporates prior knowledge:  Sensor model  Motion Model  Past behavior [Letchner, Balazinska]

 Reveal partial information in uncertain context  Perturb p` s = p s + noise(p c )  Return p` s instead of p s  Compromises soundness  Answers returned may be wrong  Justifiable as system is itself uncertain!  Degree of confidence in answer also returned (Re)defining PAC: Data Perturbation ? ? ? ?  Let Pr(context) = p c  Let Pr(secret) = p s  Semantics:  p c = 1  reveal p s  p c = 0  deny query  0 < p c < 1  then what?? [Rastogi, Suciu]

 -0.5 <= noise(pc) <= 0.5 p c = 0.5p c = 0 Noise Function [Rastogi, Suciu]

 Ex: Alice slips her personal tag into Bob’s brief case  Ex: Bob tapes his tag to Alice’s office door  Detection methods:  Detect / report / investigate anomalous behavior: Two users suddenly together everywhere User stays in one place for an unusually long time  “Calm” reports of another user’s presence  Ambient display shows how many users are present  Prevention methods:  Require “personal tag” to be present in order to make a query  Add value to “personal tag”, e.g. use a phone instead of a tag Challenge: “Misplaced Tags”

 User-level controls:  Authorize access using other context (e.g. during a scheduled meeting)  Access control w/shared social knowledge: Facebook plugin [Toomim]  An economic model for pricing queries  Other policies:  Authorize access using other context (e.g. during a scheduled meeting)  Access according to user settings  Prevention:  “Proactive privacy” – device teaches users about their privacy settings Some Extensions

Thank you! Thanks! Questions?