1 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California draft-urien-hip-tag-03.txt HIP support for RFID

Slides:



Advertisements
Similar presentations
Mobile IP How Mobile IP Works? Agenda What problems does Mobile IP solve? Mobile IP: protocol overview Scope Requirements Design goals.
Advertisements

M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
IPv6 Keith Wichman. History Based on IPv4 Based on IPv4 Development initiated in 1994 Development initiated in 1994.
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
IPv6-The Next Generation Protocol RAMYA MEKALA UIN:
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 “draft-urien-eap-smartcard-type-00.txt” EAP Smart Card Protocol (EAP-SC)
Computer Networking Revision Dr Sandra I. Woolley.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 2 Network Models.
Introduction to Networks and the Internet
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Computer Network Architecture and Programming
Network Architectures Week 3 – OSI and The Internet.
1 /12 Pascal URIEN, IETF 72 rd, Monday July 28 th Dublin, Ireland draft-urien-hip-tag-00.txt HIP support for RFID
The OSI Model and the TCP/IP Protocol Suite
Mobile Agents for Integrating Cloud-Based Business Processes with On-Premises Systems and Devices Janis Grundspenkis Antons Mislēvičs Department of Systems.
Host Identity Protocol
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
1Group 07 IPv6 2 1.ET/06/ ET/06/ ET/06/ EE/06/ EE/06/ EE/06/6473 Group 07 IPv6.
指導教授:黃秋煌 報告者:黃明維 無線射頻辨識 論文報告 1. RFID Lab, Dept. IECS, FCU Outline Internet of Things architecture for a RFID-based product tracking business model SHARDIS:
2002 년 2 학기이동인터넷프로토콜 1 Mobile IP:Overview 년 2 학기이동인터넷프로토콜 2 Mobile IP overview Is Mobile IP an official standard? What problems does Mobile IP solve?
Presentation on Osi & TCP/IP MODEL
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
IT 351 Mobile &Wireless Computing Semester 2, Dr. Hala Mokhtar Room 79- 2nd floor.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
1 /14 Pascal URIEN, IETF 75 th, Tuesday July 28th Stockholm, Sweden draft-urien-hip-tag-02.txt HIP support for RFID
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE400 PROJECT Personal Area Networks Instructed by Dr.AlGhadbanPresenters.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 2 Network Models.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
draft-urien-tls-psk-emv-01
BZUPAGES.COM 2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 /10 Pascal URIEN, IETF 80 th, Tuesday 29 th March 2011, Prague, Czech Republic draft-irtf-hiprg-rfid-02 HIP support for RFIDs
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
1 /10 Pascal URIEN, IETF 72 rd, Monday July 28 th Dublin, Ireland draft-urien-tls-keygen-00.txt TLS Key Generation
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
HIP & MIP V 6 SECURITY Research: Security Architecture IRT Lab, Columbia University.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
03/22/10 draft-zhang-hip-privacy-protection- 00 Dacheng Zhang Miika Komu An Extension of HIP Base Exchange to Support Identity Privacy.
Security of the Internet of Things: perspectives and challenges
Cryptography CSS 329 Lecture 13:SSL.
SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
/13 LLCPS draft-urien-tls-llcp-01.txt Pascal Urien IETF 86, Orlando, FL, USA March 15th
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
Spring Ch 17 Internetworking Concepts, Architecture, and Protocols Part III Internetworking.
Chapter 2 Network Models.
Zueyong Zhu† and J. William Atwood‡
Network Architecture Layered system with alternative abstractions available at a given layer.
Part I. Overview of Data Communications and Networking
Mobile &Wireless Computing
Understanding the OSI Reference Model
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Amar B. Patel , Shushan Zhao
Chapter 2 Network Models
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Basics and Architectures Neil Tang 09/05/2008
Presentation transcript:

1 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California draft-urien-hip-tag-03.txt HIP support for RFID

2 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California Open Issues for the Internet Of Thing What is a thing?, from draft-urien-hip-iot-00.txt Two classes of things Things that are full computers equipped with communication interfaces. Things that are not full computers (i.e. TAGS, RFIDs), but who are associated with objects. What is the identifier of a thing? They are several proposals: A serial number, such as the EPC code. An IP address. Other, for example a fix hash value, or adhoc naming scheme.

3 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California Open issues Identity Protection Things can be used to track people or objects, which are identified by a set of things. Identity protection enforces privacy by hiding things identities thanks to cryptographic means. Communication Protocol A thing communicates with the Internet network by various interfaces Via MAC (OSI2) radio protocols, as defined by EPC GLOBAL Thanks the IP protocol, in that case the thing is an IP node, and is natively plugged in the Internet Cloud. Other, for example the Host Identity Protocol Things to Things communications In some cases, things communicate with other things. If identity protection is required, the associated infrastructure is complex from a cryptographic or physical point of view, because classical routing techniques can't be used.

4 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California HIP Tags for the IoT Project funded by the French National Research Agency (ANR) Modified BEX exchange The HIT is a true random number HIP-Tags never expose their identity in clear text, but hide this value (typically an EPC-Code) by a particular equation (f) that can be only solved by a dedicated entity, referred as the portal. f(r1,r2, EPC-Code) HIP exchanges occurred between HIP-Tags and PORTALs; they are shuttled by IP packets, through the Internet cloud.

5 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California Identity Protection for Tags Privacy issues EPC-Code MUST be protected EPC-Code is a solution of f(r1,r2,EPC-Code) Example Many f proposal in the scientific literature f(r1,r2, EPC-Code) = SHA1 (r1 | r2 | EPC-Code) Reader Tag EPC-Code r1 r2, f(r1,r2, EPC-Code) S. Weis, S. Sarma, R. Rivest and D. Engels. "Security and privacy aspects of low-cost radio frequency identification systems." In D. Hutter, G. Muller, W. Stephan and M. Ullman, editors, International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of Lecture Notes in computer Science, pages Springer-Verlag, 2003.

6 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California HIP-TAGS Architecture Main Ideas The TAG runs a modified version of HIP HIP Only! – NO IP stack HIT is a true 16 bytes random number generated by the TAG The Reader is an IP node It acts as a docking host for HIP tag The Reader is not able to solve the f equation The identity solver entity is located in a node called the PORTAL HIP dialog between Tag and Portal HIP packets MAY be encapsulated by a HAT (HIP Address Translation) layer.

7 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California HIP-Tags Architecture IP MAC PHY IP MAC PHY RFID-MAC RFID-PHY RFID-MAC RFID-PHY HIP PortalTagReader HAT HIP Identity Solver SPI-I SPI-R EPC-Code

8 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California T-Transform HMAC K = HMAC-SHA1(r1 | r2, EPC-Code) F-T = HMAC-SHA1(K, CT1 | "Type 0001 key ") CT1 = 0x (32 bits) K-AUTH-KEY = HMAC-SHA1(K, CT2 | "Type 0001 key") CT2 = 0x (32 bits)

9 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California Example, with T-Transform = 0001 HEAD 3b sHIT 6a682e53516b516f2f58ce ae6 dHIT Tag Portal HEAD 3b0a sHIT dHIT 6a682e53516b516f2f58ce ae6 ATT bytes 276d034ddd2d52793b172cb95bcd0297e2df6115 ATT bytes EPC-CODE abcdefcdab I1-T R1-T I2-T r1 r2 f Signature HEAD 3b sHIT 6a682e53516b516f2f58ce ae6 dHIT ATT bytes ATT bytes c5958b236b9b0eaa7abb25f27d24c5046e89199e ATT bytes 801dbc55c5f39789f83c6cba d83833caf ATT bytes 2a bf73abec46bddb83f1b3f7f9ded8b83

10 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California T-Transform 0002 – Tree F-T = H1 | H2 | Hi | Hn Hi = HMAC-SHA1(r1 | r2, Ki | CT1 ),or Hi = HMAC-SHA1(r1 | r2, Ki | CT2 ) CT1 = 0x , CT2 = 0x Notation: H i CTk Ki k=1,2 i=1...n K-AUTH-KEY = HMAC-SHA1(K, CT1 | "Type 0002 key") K = HMAC-SHA1(r1 | r2, EPC-Code) CT1 = 0x (32 bits) EPC-Code = 010…. F-T = H 1 CT1 K1 H 2 CT2 K2 H 3 CT1 K1 H 1 CT1 K1 H 1 CT2 K1 01 H 2 CT2 K2 H 3 CT1 K1 1 0

11 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California Open Java Resources Java code for portal. Java card code for tags. ISO tags work at 13,56 MHz. Java card are widely deployed, about 1 billion devices per year. Thanks to the NFC technology, HIP-TAG could be supported by billions of mobile phones. Code source of the T2TIT project, funded by the French National Research Agency (ANR). Papers: HIP-Tags Architecture Implementation for the Internet of Things Pascal Urien, Simon Elrharbi, Dorice Nyamy, Hervé Chabanne, Thomas Icart, François Lecocq, Cyrille Pépin, Khalifa Toumi, Mathieu Bouet, Guy Pujolle, Patrice Krzanik, Jean-Ferdinand Susini " HIP-Tags Architecture Implementation for the Internet of Things ", First Asian Himalayas International Conference on Internet AH-ICI2009, 3-5 November, 2009, Kathmandu, Nepal, Available at IEEE Explorer.