Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Slides:



Advertisements
Similar presentations
SMUCSE 7349 RFID Security. SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War.
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
By: Farnoush Farajpour ( ) Dec Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits.
Jaap-Henk Hoepman Security of Systems (SoS) group Institute for Computing and Information Sciences Radboud University Nijmegen, the Netherlands
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Security in RFID Presented By… NetSecurity-Spring07
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
RFID Cardinality Estimation with Blocker Tags
RFID Security & Privacy Matt Hansen University of Illinois Fall 2007.
Radio Frequency Identification (rfid) Aaron Roy Prof. Johnson November 28, 2009.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
CMS:Children Monitoring System By: Naif Almadhayan | Steven Smith | Mohammad Safar.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
IWD2243 Wireless & Mobile Security
Radio Frequency Identification Inventory Tracking and Status Monitoring of Blood Units Team 10 Mark Green Melissa Kronenberger Nadine Tribur Aaron Schlanser.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Developing RFID Application In Supply Chain
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
1 Ch. 17: Security of RFID slide 1. 2 Roles of RFID applications slide 2 TagsReaderServer(Database) Secure channel Slides modified from presentation by.
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
University of Pennsylvania Electrical and Systems Engineering Department ABSTRACT: The last decade has seen the expansion of computer usage from scientific.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
RFID Privacy Using User-controllable Uniqueness Sozo INOUE, Hiroto YASUURA System LSI Research Center, Grad. Sch. Information Science & Electrical Engineering,
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
Radio Frequency ID (RFID) Tracking System for a Building Complex Tim Gordon Matt Tracy John O’Malley Mentor: Y. Shang, Y. Saab.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels, Ronald Rivest, and Michael Szydlo ACM CCS, October 2003 Presented by Himanshu.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
RFID SECURITY.
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
1. 2 Technology The Evolution Of 3 What is RFID Technology? Radio Frequency Identification - A technology that uses electronic tags placed on objects,
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Radio Frequency Identification composition - implementation – vision
English for Advance Learners I
Radio Frequency Identification (RFID)
BEYOND THE BARCODE Beyond the Barcode.
Team 7 Technical Presentation
Radio Frequency Identification
Randomized PRF Tree Walking Algorithm for Secure RFID
Selective Blocking of RFID Tags for Consumer Privacy
- Dylan Leintz - Dr. Davies
Mobile Computing Lecture Materials By Bintang Eka Putera.
RFID used for real-time tracking Physics 490 seminar 4/15/2019
Presentation transcript:

Foundations of Privacy 2010 Guy Katz

 Introduction to RFID  How does it work  Threats to user privacy  Possible solutions

 “Wireless” Identification System  Consists of ◦ Tag  Small transponder  Attached to a physical object ◦ Transceiver  Reads (writes) data from tags  Connected to some database

 RFID has been around for 60 years ◦ “Friend or Foe” systems in WW II:  German pilots would roll their planes when coming back to base  The British put basic transmitters on theirs  Theft prevention (1970’s) ◦ Trucks in Los Alamos laboratory had transponders  Toll payments  Agriculture

 A large increase in deployment since year 2000  Reasons: ◦ Tags and readers much smaller and cheaper ◦ World wide standardization (ISO)

 Supply Chain Management ◦ From production to customer; replaces bar codes  Payment systems ◦ Toll roads, cafeterias, Rav-Kav  Access Control ◦ Weizmann Institute of Science  Theft Prevention  Anti-Counterfeiting ◦ Passports, Money Bills  Implanted Tags

Electronic Product Codes (RFID) Barcodes Read RateHigh throughput. Multiple (>100) tags can be read simultaneously Very low throughput. Tags can only be read manually, one at a time Line of SightNot requiredDefinitely required DurabilityCan even be internally attached Easily damaged, swapped or removed; cannot be read if dirty or greasy Human CapitalVirtually none. Once up and running, the system is completely automated Large requirements. Laborers must scan each tag Event Triggering Capable. Can be used to trigger certain events (like door openings, alarms, etc) Not capable. Cannot be used to trigger events

 Contain an antenna and a small circuit  Purpose in life: broadcast an ID ◦ Usually 128 bits  Very small - a few millimeters  “Cost Barrier” – 5 cent per tag  Two subgroups: ◦ Active Tags ◦ Passive Tags Integrated Circuit 4 x 4 mm

 Can initiate communication on their own ◦ Transmit, looking for a reader  Range can be over 100 meters  Require a power source ◦ Consequently, expensive Active RFIF Tag Part of a monitoring system 6.5 x 4 x 2 cm

 No power source ◦ Consequently, very cheap  Energy extracted from RF signal  Can’t initiate communication on their own ◦ Need to receive energy before they can answer  Range up to 10 meters

 Power tags through RF signals  Usually connected to some database  Singulation (Anti-Collision) ◦ Communicate with many tags at once  Still a bit expensive ◦ Cheapest ones around 500$

 A method used by readers  Goal: discover all present tags  Difficulty: If many tags answer together, answers get mixed up  The reader can’t separate their answers ◦ Does know that more than one tag responded  Need a way to solve collisions…

 The standard singulation protocol  Each round, readers looks for a n-bit prefix ◦ Asks: “Who starts with 1010…?” ◦ Tags answer with their next digit  If multiple tags answer, recurse on both (n+1) bits prefixes  For n tags and k identity bits, O(n*k)  In practice, a few seconds for a shopping cart

Who has “ “? Who has “1“? Who has “10“? 101 Who has “0“? Who has “00“?Who has “01“?

 Various ranges ◦ From 120 KHz to 10.6 GHz  Dictate passive read range ◦ From 10cm to 10 meters, accordingly.  Can be used to ignore more distant tags

 Sniffing/Eavesdropping  Spoofing/Cloning  Tracking  Replay  Denial Of Service Not all attacks related to privacy!

 Tags contain an identification code  EPC usually consists of bits ◦ Some bits indicate vendor and product ID ◦ Others form a unique product ID  Tags becomes associated with a person! ◦ Don’t even need to know item type

 Reading is done silently and remotely  Personal information can be gathered ◦ Information about individuals’ habits: where you go, what you buy… ◦ Physical tracking of people  Military and Corporate Espionage ◦ Track down parts and components  Implanted Tags ◦ Big Brother?

 Need to keep the tags cheap  A wide range of systems and uses ◦ No single solution suits everyone  Need to only block malicious readings  Defining the typical adversary ◦ What sort of equipment? Readers, tags, scanners, etc… ◦ What sort of abilities?  Can impersonate a reader? Connect to the DB? ◦ Always present?

 We focus on EPC (Electronic Product Code) RFID tags  Goal: prevent the adversary from associating a tag with a person

 Physically prevent RFID tags from transmitting ◦ Aluminum foil lined wallets ◦ Special cases for smart passports  Take off covers when transmission needed  Problem: only suitable for specific RFID tags ◦ Led lined supermarket bags?  Commercial products already available Passport Case Available for 18$

 Tags contain a “kill” command ◦ A supermarket might disable tags on checkout  Zombie tags don’t answer readers  Prevents association of people with their tags ◦ Covers most privacy concerns  Problems: ◦ Some applications need the tag alive  Alice’s milk carton  Return products to stores  Toll payment tags, implanted tags

 An approach proposed by Juels and Brainard (2004)  Tags broadcast a privacy bit – “its ok/not ok to read me”  Problem: readers may choose to obey policy ◦ Corrupt readers risk being caught  How does the owner configure the tags?  Naïve solution…

 Cryptographic solutions inherently expensive ◦ Require computational power ◦ Require more memory ◦ Sometimes require source of randomness  Three approaches have been proposed: ◦ Hash-Lock ◦ Re-Encryption ◦ Silent Tree Walking  So far, all too expensive to be practical ◦ But we’ll have a look anyway…

 Similar to a password  A tag can be locked by a reader ◦ Locked tags don’t transmit until unlocked ◦ Locked tags have an ID y ◦ Can only be unlocked by x s.t. h(x) = y  h: standard one-way hash function  The consumer knows x, can unlock at home  When locked, cannot be associated with the owner

 Problems: ◦ Tags still need to calculate h(x)  Expensive… ◦ Many tags, hard to manage ◦ Consumer might not be aware of all the tags he’s carrying

 Mechanism to prevent counterfeiting of money bills  The idea: ◦ Put an RFID tag inside the bill ◦ Every bill has a unique ID ◦ Encrypt the ID with a police public key ◦ Periodically re-encrypt it  Can’t link different appearances of a given tag

 Re-encryption done by external agents (in big stores, banks, etc)  Problems: ◦ Costly infrastructure ◦ Burdensome process  Often need to re-encrypt  People naturally lazy ◦ Unclear just how effective the process is

 Readers use singulation protocols ◦ Most common: Tree Walking  It is sufficient to eavesdrop the reader to identify the tag (up to last bit)  A reader transmits much louder ◦ Can be “heard” from further away  The idea: encrypt the reader’s requests ◦ Makes eavesdropping harder

 Problem: How to encrypt? ◦ Tags have limited resources and no randomness ◦ Need a shared reader-tag key beforehand ◦ Makes the system impractical  Still, might be useful combined with other solutions…

 Using an exterior device to block tag readers  Enables a user to block the adversary ◦ One blocker suffices for all tags ◦ Cheap  Same price as a tag  Don’t have to change existing RFID tags  Can turn off at home…

 The idea: disrupt the singulation protocol ◦ Trick the reader - make it think all tags are present ◦ Makes reading useless  For instance, a tag that disrupts the tree walking algorithm ◦ Always answers both 0 and 1  Might require two antennas ◦ The reader doesn’t know which tags exist

 The blocker will disrupt any reading around it  Can be configured to only disrupt “private branches” ◦ Specific ID’s defined as private ◦ Readers have no right to read them…  Can change the tree walking algorithm to avoid unneeded queries

Who has “ “? Who has “1“? Who has “10“? 101 Who has “0“? Blocker Blocks 0* Blocker Blocks 0* 0 Who has “00“? 1 Who has “01“?

 Can the blocker itself pose a privacy breech? ◦ Can track a unique “private zone” ◦ Allow only a few privacy policies?  Bob’s blocker may disrupt Alice’s readings ◦ Can use a random “private zone” to avoid conflicts ◦ Tradeoff with the previous bullet  Tailored for the tree walking algorithm ◦ However, should be adjustable to any other algorithm as well  Can be used in Denial of Service attacks

 RFID is becoming cheap and widespread  It can easily disclose private information  Partial solutions: ◦ Physical blocks ◦ Zombie tags ◦ Privacy Bits  Encryption schemes are effective, but require expensive tags and infrastructure ◦ Only suitable for specific cases  Blocker tags are a cheap, effective solution for EPC RFID tags

 “Squealing Euros: Privacy-Protection in RFID- Enabled Banknotes” by Juels and Pappu, 2003  “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems” by Weis et al, 2003  “Selective Blocking of RFID Tags for Consumer Privacy” by Juels, Rivest & Szydlo, 2003  “RFID Privacy: An Overview of Problems and Proposed Solutions” by Garfinkel, Juels & Pappu, 2005  “RFID”, presentation by Alon Rosen