1 Department of Computer Science University of Virginia New Directions in Reliability, Security and Privacy in Radio Frequency Identification Systems Leonid.

Slides:



Advertisements
Similar presentations
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Advertisements

Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Lecture10 – More on Physically Unclonable Functions (PUFs)
Physical Unclonable Functions and Applications
Physical Unclonable Functions
A Survey of Secure Wireless Ad Hoc Routing
Digital Signatures and Hash Functions. Digital Signatures.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Department of Computer Science University of Virginia The Practicality of Multi-Tag RFID Systems Leonid Bolotnyy Scott Krize Gabriel Robins.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Outline  Introduction  Related Work  PUF-Based Tag Identification Algorithm  PUF-Based MAC Protocols  PUF Vs. Digital Hash Functions  Building PUFs.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Authenticating streamed data in the presence of random packet loss March 17th, Philippe Golle, Stanford University.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Wireless Sensor Network Security Anuj Nagar CS 590.
RFID Cardinality Estimation with Blocker Tags
RFID Object Localization Gabriel Robins and Kirti Chawla Department of Computer Science University of Virginia
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Chapter 10: Authentication Guide to Computer Network Security.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
Cryptography on Non-Trusted Machines Stefan Dziembowski.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Chapter 21 Distributed System Security Copyright © 2008.
Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions Shaoying Cai 1 Yingjiu Li 1 Tieyan Li 2 Robert H. Deng 1 1 Singapore.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Lecture 2: Introduction to Cryptography
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
New Directions in Detection, Security and Privacy for RFID
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Network Security Celia Li Computer Science and Engineering York University.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Vehicle Management System Adopted successfully with I.D., wireless Vehicle Management Systems (VMS) for Parking, Residential Societies.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Leonid Bolotnyy Gabriel Robins
The Practicality of Multi-Tag RFID Systems
Cryptographic Hash Function
Zahra Ahmadian Recursive Linear and Differential Cryptanalysis of Ultra-lightweight Authentication Protocols Zahra Ahmadian
Randomized PRF Tree Walking Algorithm for Secure RFID
Physical Unclonable Functions and Applications
Topic 13: Message Authentication Code
RFID Object Localization
Presentation transcript:

1 Department of Computer Science University of Virginia New Directions in Reliability, Security and Privacy in Radio Frequency Identification Systems Leonid Bolotnyy Gabriel Robins

2 Talk Outline Introduction to RFID Reliable Object Identification –Multi-Tag RFID Systems Physical Security and Privacy –PUF-Based Algorithms Inter-Tag Communication –Generalized Yoking-Proofs Common Themes and Conclusion

3 Talk Outline Introduction to RFID Reliable Object Identification –Multi-Tag RFID Systems Physical Security and Privacy –PUF-Based Algorithms Inter-Tag Communication –Generalized Yoking-Proofs Common Themes and Conclusion

4 General RFID System Tag ID Tags Reader Local Server

5 Introduction to RFID passivesemi-passiveactive Tags types: Frequencies: Low (125KHz), High (13.56MHz), UHF (915MHz) Coupling methods: reader antenna signal Inductive couplingBackscatter coupling

6 RFID History What’s next?

7 Talk Outline Introduction to RFID Reliable Object Identification –Multi-tag RFID Systems Physical Security and Privacy –PUF-Based Algorithms Inter-Tag Communication –Generalized Yoking-Proofs Common Themes and Conclusion

8 Obstacles of Reliable Identification Bar-codes vs. RFID –line-of-sight –scanning rate Object detection obstacles –radio noise is ubiquitous –liquids and metals are opaque to RF milk, water, juice metal-foil wrappers –temperature and humidity –objects/readers moving speed –object occlusion –number of objects grouped together –tag variability and receptivity –tag aging

9 Case Studies Defense Logistics Agency trials (2001) –3% of moving objects did not reach destination –20% of tags recorded at every checkpoint –2% of a tag type detected at 1 checkpoint –some tags registered on arrival but not departure Wal-Mart experiments (2005) –90% tag detection at case level –95% detection on conveyor belts –66% detection inside fully loaded pallets

10 Multi-Tag RFID Use Multiple tags per object to increase reliability of object detection/identification

11 The Power of an Angle Inductive coupling: distance ~ (power) 1/6 Far-field propagation: distance ~ (power) 1/2 Optimal Tag Placement: B-field β power ~ sin 2 (β)

12 Equipment and Setup Setup –empty room –20 solid non-metallic & 20 metallic and liquid objects –tags positioned perpendicular to each other –tags spaced apart –software drivers Equipment x1 x8 x4 x100’s

13 Experiments Read all tags in reader’s field Randomly shuffle objects Compute average detection rates Variables –reader type –antenna type –tag type –antenna power –object type –number of objects –number of tags per object –tags’ orientation –tags’ receptivity

14 Linear Antennas 1Tag: 58% 2Tags: 79% 3Tags: 89% 4Tags: 93%

15 Circular Antennas 1Tag: 75% 2Tags: 94% 3Tags: 98% 4Tags: 100%

16 Linear Antennas vs. Multi-tags 1 Reader, 1 Tag 58.0% 2 Readers, 1 Tag 64.9% 1 Reader, 2 Tags 79.3% 2 Readers, 2 Tags 84.5% Δ=21.3% Δ=19.8% Δ= 5.2% Δ=14.4% Δ= 6.9%

17 Importance of Tag Orientation 21% -7% 12% 25%

18 Detection in Presence of Metals & Liquids Power=31.6dBm, No Liquids/MetalsPower=31.6dBm, With Liquids/Metals Power=27.6dBm, No Liquids/Metals Power=27.6dBm, With Liquids/Metals Circular Antenna Number of Tags Detection Probability Decrease in solid/non-liquid object detection Significant at low power Similar results for linear antennas

19 Varying Number of Objects Experiment 1: 15 solid non-metallic & 15 liquids and metals Experiment 2: 20 solid non-metallic & 20 liquids and metals Metals & Liquids ∆ : 3%-13%

20 Applications of Multi-Tags ReliabilityAvailability Safety Localization

21 More Applications Tagging Bulk MaterialsPackaging Theft PreventionSecurity

22 Economics of Multi-Tags YearCost Rapid decrease in passive tag cost 5 cent tag expected in penny tag in a few years

23 Cost Trends Time

24 Multi-Tag Conclusion Unreliability of object detection –radio noise is ubiquitous –liquids and metals are opaque to RF milk, water, juice metal-foil wrappers –temperature and humidity –objects/readers moving speed –object occlusion –number of objects grouped together –tag variability and receptivity –tag aging Many useful applications Favorable economics $0.00 $0.20 $0.40 $0.60 $0.80 $ Historical CostPrediction Cost

25 Talk Outline Introduction to RFID Reliable Object Identification –Multi-tag RFID Systems Physical Security and Privacy –PUF-Based Algorithms Inter-Tag Communication –Generalized Yoking-Proofs Common Themes and Conclusion

26 Motivation Digital crypto implementations require 1000’s of gates Low-cost alternatives –Pseudonyms / one-time pads –Low complexity / power hash function designs –Hardware-based solutions MD MD SHA Yuksel 1701 AES 3400 algorithm # of gates

27 PUF-Based Security Physical Unclonable Function [Gassend et al 2002] PUF security is based on –wire delays –gate delays –quantum mechanical fluctuations PUF characteristics –uniqueness –reliability –unpredictability PUF assumptions –Infeasible to accurately model PUF –Pair-wise PUF output-collision probability is constant –Physical tampering will modify PUF

28 Individual Privacy in RFID Privacy ABC Alice was here: A, B, C privacy

29 Hardware Tampering Privacy Models 1.Restrict memory tampering functions - allow bit flips read-proof tamper-proof Allow adversary to tamper with tag’s memory 3. Detect privacy compromise - detect PUF modification 2. Purely physical privacy - no digital secrets Cannot provide privacy without restricting adversary - simple secret overwrite allows tag tracking

30 Private Identification Algorithm Assumptions –no denial of service attacks (e.g., passive adversaries, DoS detection/prevention mechanisms) –physical compromise of tags not possible It is important to have –a reliable PUF –no loops in PUF chains –no identical PUF outputs ID Request p(ID) ID Database ID 1, p(ID 1 ), p 2 (ID 1 ), …, p k (ID 1 )... ID n, p n (ID n ), p n 2 (ID n ), …, p n k (ID n )

31 PUF-Based Ownership Transfer Ownership Transfer To maintain privacy we need –ownership privacy –forward privacy Physical security is especially important Solutions –public key cryptography (expensive) –knowledge of owners sequence –short period of privacy –trusted authority

32 PUF-Based MAC Algorithms MAC based on PUF –Motivation: “yoking-proofs”, signing sensor data –large keys (PUF is the key) –cannot support arbitrary messages MAC = (K, τ, υ) K K valid signature σ : υ (M, σ) = 1 forged signature σ’ : υ (M’, σ’) = 1, M = M’ Assumptions –adversary can adaptively learn poly-many (m, σ) pairs –signature verifiers are off-line –tag can store a counter (to timestamp signatures)

33 Large Message Space σ (m) = c, r 1,..., r n, p c (r 1, m),..., p c (r n, m) Assumption: tag can generate good random numbers (can be PUF-based) Signature verification requires tag’s presence password-based or in radio-protected environment (Faraday Cage) learn p c (r i, m), 1 ≤ i ≤ n verify that the desired fraction of PUF computations is correct To protect against hardware tampering authenticate tag before MAC verification store verification password underneath PUF Key: PUF

34 Small Message Space Assumption: small and known a priori message space Key[p, m i, c] = c, p c (1) (m i ),..., p c (n) (m i ) PUF message counter σ(m) = c, p c (1) (m),..., p c (n) (m),..., c+q-1, p c+q-1 (1) (m), p c+q-1 (n) (m) sub-signature Verify that the desired number of sub-signatures are valid PUF reliability is again crucial

35 Attacks on MAC Protocols originalclone Impersonation attacks –manufacture an identical tag –obtain (steal) existing PUFs Hardware-tampering attacks –physically probe wires to learn the PUF –physically read-off/alter keys/passwords Side-channel attacks –algorithm timing –power consumption Modeling attacks –build a PUF model to predict PUF’s outputs

36 Conclusions and Future Work Hardware primitive for RFID security Identification, MAC, Ownership Transfer, and Tag Authentication Algorithms Properties: –Physical keys –Protect tags from physical attacks –New attack models Future Work: –Design new PUF –Manufacture and test PUF –Develop PUF theory –New attack models

37 Talk Outline Introduction to RFID Reliable Object Identification –Multi-tag RFID Systems Physical Security and Privacy –PUF-Based Algorithms Inter-Tag Communication –Generalized Yoking-Proofs Common Themes and Conclusion

38 Inter-Tag Communication in RFID Idea: Heterogeneity in ubiquitous computing Applications:

39 “Yoking-Proofs” Applications – verify that: –medicine bottle sold together with instructions –tools sold together with safety devices –matching parts were delivered together –several forms of ID were presented Problem Statement: Generate proof that a group of passive tags were identified nearly-simultaneously Key Observation: Passive tags can communicate with each other through reader Yoking: joining together / simultaneous presence of multiple tags

40 Assumptions and Goals Assumptions –Tags are passive –Tags have limited computational abilities –Tags can compute a keyed hash function –Tags can maintain some state –Verifier is trusted and powerful Solution Goals –Allow readers to be adversarial –Make valid proofs improbable to forge –Allow verifier to verify proofs off-line –Detect replays of valid proofs Timer on-board a tag –Capacitor discharge can implement timeout

41 Generalized “Yoking-Proof” Protocol Anonymous Yoking: tags keep their identities private Idea: construct a chain of mutually dependent MACs

42 Related Work on “Yoking-Proofs” Saito and Sakurai [2005] –solution relies on timestamps generated by trusted database –violates original problem statement –one tag is assumed to be more powerful than the others –vulnerable to “future timestamp” attack Piramuthu [2006] –discusses inapplicable replay-attack problem of Juels’ protocol –independently observes the problem with Saito/Sakurai protocol –proposed fix only works for a pair of tags –violates original problem statement Juels [2004] –protocol is limited to two tags –no timely timer update (minor/crucial omission)

43 Talk Outline Introduction to RFID Reliable Object Identification –Multi-tag RFID Systems Physical Security and Privacy –PUF-Based Algorithms Inter-Tag Communication –Generalized Yoking-Proofs Common Themes and Conclusion

44 Generalized “Yoking-Proofs” Multi-Tags PUF-Based Security and Privacy RFID Common Themes

45 Conclusion and Future Research Contributions Future Research –More multi-tag tests –Object localization using multi-tags –Split tag functionality between tags –Prevent adversarial merchandize inventorization –PUF design –More examples of inter-tag communication –Applications of RFID

46 Publications L. Bolotnyy and G. Robins, Multi-tag Radio Frequency Identification Systems, IEEE Workshop on Automatic Identification Advanced Technologies (Auto-ID), Oct L. Bolotnyy and G. Robins, Randomized Pseudo-Random Function Tree Walking Algorithm for Secure Radio- Frequency Identification, IEEE Workshop on Automatic Identification Advanced Technologies (Auto-ID), Oct L. Bolotnyy and G. Robins, Generalized “Yoking Proofs” for a Group of Radio Frequency Identification Tags, International Conference on Mobile and Ubiquitous Systems (Mobiquitous), San Jose, CA, July L. Bolotnyy and G. Robins, Physically Unclonable Function -Based Security and Privacy in RFID Systems, IEEE International Conference on Pervasive Computing and Communications (PerCom), New York, March L. Bolotnyy, S. Krize, and G. Robins, The Practicality of Multi-Tag RFID Systems, International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT), Madeira, Portugal, June L. Bolotnyy and G. Robins, The Case for Multi-Tag RFID Systems, International Conference on Wireless Algorithms, Systems and Applications (WASA), Chicago, Aug L. Bolotnyy and G. Robins, Multi-Tag RFID Systems, International Journal of Internet and Protocol Technology, Special issue on RFID: Technologies, Applications, and Trends, 2(3/4), conference and 1 journal paper in submission 2 invited book chapters in preparation Security in RFID and Sensor Networks, to be published by Auerbach Publications, CRC Press, Taylor&Francis Group

47 More Successes Deutsche Telekom (largest in EU) offered to patent our multi-tags idea. Received $450,000 NSF Cyber Trust grant, 2007 (PI: Gabriel Robins). Technical Program Committee member: International Workshop on RFID Technology - Concepts, Applications, Challenges (IWRT), Barcelona, Spain, June Our papers and presentation slides used in lecture-based undergraduate/graduate courses (e.g., Rice University, George Washington University).

48

49 Thank You! Questions? Dissertation Committee: Gabriel Robins (advisor), Dave Evans, Paul Reynolds, Nina Mishra, and Ben Calhoun Stephen Wilson, Blaise Gassend, Daihyun Lim, Karsten Nohl, Patrick Graydon, and Scott Krize

50 BACK UP SLIDES NOT USED DURING PRESENTATION

51 Types of Multi-Tags Triple-Tags n-Tags Dual-Tags –Own Memory Only –Shared Memory Only –Own and Shared Memory Redundant Tags Complimentary Tags

52 Controlling Variables 1.Radio noise 2.Tag variability 3.Reader variability 4.Reader power level 5.Distance to objects & type, # of antennas

53 Circular Antennas vs. Multi-Tags Power = 31.6dBm Object Number Detection Probability 1 Reader, 1 Tag 75.9% 2 Readers, 1 Tag 91.0% 1 Reader, 2 Tags 94.2% 2 Readers, 2 Tags 99.4% Δ=18.3% Δ=8.4% Δ= 5.2% Δ=3.2% Δ= 15.1%

54 1 Tag2 Tags3 Tags4 Tags Power Decrease in detection with decrease in power More rapid decrease in detection for circular antennas

55 Low detection probabilities Drop in detection at low power Linear antennas outperform circular Multi-tags better than multiple readers Multi-Tags on Metals and Liquids

56 Detection Delta 1 tag 2 tags 3 tags 1 tag 2 tags 3 tags 1 tag 2 tags 3 tags 1 tag 2 tags 3 tags

57 Anti-Collision Algorithms BinaryNo Effect Binary VariantNo Effect RandomizedLinear Increase**No Effect* STACCauses DoSNo Effect* Slotted AlohaLinear Increase**No Effect* AlgorithmRedundant TagsConnected-Tags * Assuming tags communicate to form a single response ** If all tags are detected

58 Business Case for RFID Costs & benefits (business case) –Moore’s law –higher employee productivity –automated business processes –workforce reduction Tag manufacturing yield and testing –30% of chips damaged during manufacturing –15% damaged during printing [U.S. GAO] –20% tag failure rate in field [RFID Journal] –5% of tags purchased marked defective

59 RFID Tag Demand Demand drivers –tag cost –desire to stay competitive Cost effective tag design techniques –memory design (self-adaptive silicon) –assembly technology (fluidic self assembly) –antenna design (antenna material) Increase in RFID tag demand Decrease in RFID tag cost

60 Thesis Multi-tags can considerably improve reliability in RFID systems at a reasonable cost; effective PUF implementations can enable hardware- tampering resistant algorithms for RFID security and privacy; generalized yoking-proofs can provide auditing mechanisms for the near-simultaneous reading of multiple RFID tags.

61 Related Work on PUF Optical PUF [Ravikanth 2001] Silicon PUF [Gassend et al 2002] –Design, implementation, simulation, manufacturing –Authentication algorithm –Controlled PUF PUF in RFID –Identification/authentication [Ranasinghe et al 2004] –Off-line reader authentication using public key cryptography [Tuyls et al 2006]

62 Privacy Model 1.A passive adversary observes polynomially-many rounds of reader-tag communications with multiple tags 2.An adversary selects 2 tags 3.The reader randomly and privately selects one of the 2 tags and runs one identification round with the selected tag 4.An adversary determines the tag that the reader selected Experiment: Definition: The algorithm is privacy-preserving if an adversary can not determine reader selected tag with probability substantially greater than ½ Theorem: Given random oracle assumption for PUFs, an adversary has no advantage in the above experiment.

63 Improving Reliability of Responses Run PUF multiple times for same ID & pick majority μ m (1-μ) N-m ) k R( μ, N, k ) ≥ (1 - ∑ N NmNm N+1 2 m= number of runs chain length unreliability probability overall reliability R(0.02, 5, 100) ≥ Create tuples of multi-PUF computed IDs & identify a tag based on at least one valid position value ∞ expected number of identifications S( μ, q ) = ∑ i [(1 – (1- μ ) i+1 ) q - (1 – (1-μ) i ) q ] i=1 tuple size S(0.02, 1) = 49, S(0.02, 2) = 73, S(0.02, 3) = 90 (ID 1, ID 2, ID 3 )

64 Choosing # of PUF Computations α < prob v ≤ 1 and prob f ≤ β ≤ 1 0 ≤ t ≤ n-1 i=t+1 μ i (1-μ) n-i prob v (n, t, μ) = 1 - ∑ n nini j=t+1 τ j (1-τ) n-j prob f (n, t, τ) = 1 - ∑ n njnj prob v (n, 0.1n, 0.02) prob f (n, 0.1n, 0.4)

65 MAC Large Message Space Theorem Given random oracle assumption for a PUF, the probability that an adversary could forge a signature for a message is bounded from above by the tag impersonation probability.

66 MAC Small Message Space Theorem Given random oracle assumption for a PUF, the probability that an adversary could forge a signature for a message is bounded by the tag impersonation probability times the number of sub-signatures.

67 Purely Physical Ownership Transfer oid = h(counter) r 1, a = h s (r 0, r 1 ) r 0, c 1,..., c n (r 1, a) Challenges sent to tag in increasing order counter = counter - 1 h s (r 1, new) Properties: –All PUF computations must be correct –PUF-based random number generator –Physical write-once counter –oid is calculated for each identification –Inherently limited # of owners s = p oid (v 1 )... p oid (v n ) v 1 = h(c 1 ),..., v n = h(c n ) ++

68 s 2,4 s 1,2 s 3,9 s 2,5 s 3,10 s 3,8 Using PUF to Detect and Restore Privacy of Compromised System 1.Detect potential tag compromise 2.Update secrets of affected tags s 1,0 s 2,0 s 1,1 s 2,1 s 3,1 s 2,2 s 2,3 s 3,0 s 3, 4 s 3,5 s 3,2 s 3,3 s 3,7 s 3,6

69 PUF vs. Digital Hash Function Reference PUF: 545 gates for 64-bit input –6 to 8 gates for each input bit –33 gates to measure the delay Low gate count of PUF has a cost –probabilistic outputs –difficult to characterize analytically –non-unique computation –extra back-end storage Different attack target for adversaries –model building rather than key discovery Physical security –hard to break tag and remain undetected MD MD SHA Yuksel 1701 PUF 545 AES 3400 algorithm # of gates

70 PUF Design Attacks on PUF –impersonation –modeling –hardware tampering –side-channel Weaknesses of existing PUF New PUF design –no oscillating circuit –sub-threshold voltage Compare different non-linear delay approaches reliability

71 PUF Contribution and Motivation Contribution Physical privacy models Privacy-preserving tag identification algorithm Ownership transfer algorithm Secure MAC algorithms Comparison of PUF with digital hash functions Motivation Digital crypto implementations require 1000’s of gates Low-cost alternatives –Pseudonyms / one-time pads –Low complexity / power hash function designs –Hardware-based solutions

72 Speeding Up The Yoking Protocol starting / closing tags Idea: split cycle into several sequences of dependent MACs Requires –multiple readers or multiple antennas –anti-collision protocol