EPC for Security Applications By Jacob Ammons & Joe D’Amato.

Slides:



Advertisements
Similar presentations
Made Harta Dwijaksara Park, Yi Jae
Advertisements

Stephen Upton – 2 June 2005EURIM Personal Identity Working Group Secure identity – a personal view Stephen Upton Office: Mobile:
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Technical Issues Regarding Near Field Communication Group 16 Tyler Swofford Matthew Kotan.
Review of Patents Agenda Item 3: Report of the New Technologies Working Group.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Daniel E. Holcomb, Wayne P. Burleson and Kevin Fu
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
RFIDs and the Future Logistic System Dr. Hayden So Department of Electrical and Electronic Engineering 17 Sep, 2008.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Security in RFID Presented By… NetSecurity-Spring07
Risk of Using RFID chips in Passports Oscar Mendez.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
RFID passports How does is work? Step by step By: Einav Mimram.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Radio Frequency ID (RFID): Brian E. Mennecke Deans Faculty Fellow in MIS & Associate Professor Iowa State University College of Busiess.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Jörn-Marc Schmidt Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks.
Lake Ontario U.S. Entry Requirements. Travel Documents ► Canadian citizens are required to present one of the following valid WHTI-compliant documents.

RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Radio Frequency Identification Securing Your Personal Information November 10, 2005.
Ignite Presentation: Near Field Communication Harry Yang.
RFID (RADIO FREQUENCY IDENTIFICATION)
Radio Frequency Identification
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers.
Radio Frequency Identification (RFID)
RFID, Surveillance and Privacy Radio-Frequency Identification (RFID), Surveillance and Privacy Ross Stapleton-Gray, Ph.D., CISSP Stapleton-Gray & Associates,
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
3506-D WEST LAKE CENTER DRIVE,
Agenda Item 3: Report of the New Technologies Working Group
Presented By:- Siva Prasad Reddy Nooli
Biometric technology: The beginning of a digital era
Bluetooth, RFID, Data Link Layer Switching
Karl Koscher University of Washington Seattle, Washington, USA
What are the Different Types of Anti-theft Devices Used in your Car?
Team 7 Technical Presentation
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
SOLUTION ID CARDS AND DRIVER’S LICENSES
Selective Blocking of RFID Tags for Consumer Privacy
Mobile Computing Lecture Materials By Bintang Eka Putera.
IOT Technologies: Radio Frequency Identification (RFID)
Agenda Item 3: Report of the New Technologies Working Group
Presentation transcript:

EPC for Security Applications By Jacob Ammons & Joe D’Amato

RFIDs ●An electronic tag which can be used to relay information to a reader using RF fields ●Can be read from outside line of sight

RFIDs In Identity Documents In 2008 the Western Hemisphere Travel Initiative announced that US citizens must now use either a passport or enhanced drivers license for travel to U.S., Canada, or Bermuda by sea and land. “A vicinity Radio Frequency Identification (RFID) chip that will signal a secure system to pull up your biographic and biometric data for the CBP officer as you approach the border inspection booth” DHS.gov Radio Frequency Identification (RFID)

Original Thoughts on Security ●uses Class-1 Gen-2 tags - Standard of passive RFID tags ●State department and members of Congress expressed concern of security and privacy of tags ●NIST approved RFID to ISO standard

Original Thoughts on Security cont. ●RFID tags have a Tag Identifier (TID)- unique to each tag “the risk of cloning RFID enabled cards and an impostor with similar physical features gaining illegal entry into the U.S., while unlikely, is real. Fortunately, there is a powerful tool that can be used to remove the risk of cloning. This tool is the Tag Identifier, or TID. The TID is available on all Gen 2 RFID tags.” United States Department of Homeland Security

Problems w/ RFIDs in ID Document ●The TIDs found inside passport cards and enhanced license are a E2 type class meaning they only contain manufacture and model id numbers. Thus no unique identification number is associated. ●This allows for a clone of the EPC and TID values onto a commercially available off-the-shelf tag.

Kill Pin ●The Kill Pin of the EDL is not locked. It has been verified on a cloned EDL that a reader could be used to set the kill pin over-the-air rendering it useless to the owner. ●Known as P kill - 32 bit pin

Read Range Experiments ●The range of reading an RFID is key to security ●Agencies provide sleeves to act as faraday cages ●Position of ID is important to read range

Read Range Experiments Results Results with Secure sleeves or without Results for position of ID +means they ran out of space

Kill Based Authentication ●Based off the RFID tag sending back Not Enough Power replay to a kill command from the reader which has enough power to make the tag respond but not kill itself ●Based on the knowledge of a reader knowing Pkill ●Sends an invalid Pin Pkill’ and the Pkill ●invalid is dropped and the correct Pin is acknowledged ●½ probability is enough to catch a cloned

KBA cont. ●KBA can be improved by sending N-1 incorrect PINS and the one correct pin ●Make probability of detection 1- 1/N ●Problems: may unintentionally kill tag ●To get the power level ramp power till you get a successful replay from the tag

Simple KBA Experiment Designing a method to reduce unintentional kills 1.Use an increasing power range 15 dBm to 30 dBm in 0.25 dB increments transmitting a KILL command at each power level in turn until the reader successfully receives a reply from the target tag, the power level is fixed. 2.The reader then sends a total of N KILL commands, with N − 1 bogus PINs, and 1 real PIN. 3.Wait for successful authentication response. If fail - go back to (1) Note: Unintentional kills at short distances (power can’t be adjusted low enough)

Scaled KBA A good KBA algorithm should support: -Reading Therefore we need a good KBA algorithm that allows reading without unintentionally killing the device. *By altering μ and δ we can achieve authentication and readability. ( μ : potential to kill back off )

Scaled KBA PWRW - PWRR < μ

Min and max power levels for these tests

Conclusion ●Cloning is a problem on EPC IDs ●KBA is a viable way to authenticate RFID tags)

Reference K. Koscher, V. Brajkovic, T. Kohno,A. Juels, " EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond,CCS’09, November 2009, : 0-koscher.pdf.