Network Security - IT653 Deepti Agrawal KReSIT, IIT Bombay

Slides:



Advertisements
Similar presentations
SMUCSE 7349 RFID Security. SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War.
Advertisements

TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications.
RFID Radio Frequency IDentification By Özcan Tunalılar 27 th March 2008.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Slide 1 Vitaly Shmatikov CS 378 RFID Security and Privacy.
FIT3105 Smart card based authentication and identity management Lecture 4.
RFID Security and Privacy A Research Survey Shruti Pathak CS 585 Spring ‘09.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
Security in RFID Presented By… NetSecurity-Spring07
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Radio-Frequency Identification (RFID) Andrew Bowdle MD, PhD Professor of Anesthesiology and Pharmaceutics Chief of the Division of Cardiothoracic Anesthesiology.
Slide 1 Vitaly Shmatikov CS 378 RFID Security and Privacy.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
RFID Security & Privacy Matt Hansen University of Illinois Fall 2007.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID Cow Jewelry – or – Revolution Travis Sparks
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
1 Mon. December 3, 2001A Secure National ID Card Group 8 Chris Marinak Mike Cuvelier Adam Sowers Saud Bangash.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
SECURE SYMMETRIC AUTHENTICATION FOR RFID TAGS
RFID – An Introduction Murari Raghavan UNC-Charlotte.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Nick Ruggieri CIS 1055 Section 005 Radio Frequency Identification  RFID System A wireless, non contact system that uses data from a tag for the purpose.
Developing RFID Application In Supply Chain
Overview  What is RFID?  How to use it?  Relevant links  Future Trends  Bibliography.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
RFID Tags: Privacy and Security without Cryptography Ari Juels RFID-Privacy Workshop at MIT 15 November 2003.
Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories.
1 Ch. 17: Security of RFID slide 1. 2 Roles of RFID applications slide 2 TagsReaderServer(Database) Secure channel Slides modified from presentation by.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
RFID Security without Extensive Cryptography Sindhu Karthikeyan Mikhail Nesterenko Kent State University SASN November 07, 2005.
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
RFID Privacy Using User-controllable Uniqueness Sozo INOUE, Hiroto YASUURA System LSI Research Center, Grad. Sch. Information Science & Electrical Engineering,
RFID Technology What is it? (And why should you care?)
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels, Ronald Rivest, and Michael Szydlo ACM CCS, October 2003 Presented by Himanshu.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
Radio Frequency Identification
RFID. A Technology That Changes Everything John Davis.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
RFID SECURITY.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
RFID Lynsey Charles Kyle Jahnke Andrew Kangerga Jake Whitesides
RFID A technology I advocate, despite the disadvantages Will cover what it is, how it’s used, its advantages, and its bad side.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Yes? Or No?. Radio-frequency identification is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product,
RADIO FREQUENCY IDENTIFICATION TECHNOLOGY. By Twesige Richard.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
What is a Radio-Frequency Identification (RFID) tag?
Radio Frequency Identification (RFID)
RFID Technology & It’s Uses
OCR GCSE ICT Data capture methods.
Team 7 Technical Presentation
Radio Frequency Identification
Selective Blocking of RFID Tags for Consumer Privacy
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

Network Security - IT653 Deepti Agrawal KReSIT, IIT Bombay RFID SECURITY Network Security - IT653 Deepti Agrawal KReSIT, IIT Bombay

What is RFID? Radio-Frequency Identification Tag Antenna Chip Holds a small amount of unique data – a serial number or other unique attribute of the item The data can be read from a distance – no contact or even line of sight necessary Antenna Chip

How Does RFID Work? Tags (transponders) Reader (transceiver) Database 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from 3-5 inches to 3 yards Tags (transponders) Attached to objects, call out their (unique) name and/or static data on a special radio frequency Reader (transceiver) Reads data off the tags without direct contact Database Matches tag IDs to physical objects

RFID Tag Power Sources Passive (this is what mostly used now) Tags are inactive until the reader’s interrogation signal “wakes” them up Cheap, but short range only Semi-passive On-board battery, but cannot initiate communication Can serve as sensors, collect information from environment: for example, “smart dust” for military applications More expensive, longer range Active On-board battery, can initiate communication

The capabilities of a basic RFID tag Little memory Static 64-to-128-bit identifier in current ultra-cheap generation Little computational power A few thousand gates Static keys for read/write permission Not enough resources to support public- or symmetric-key cryptography Cannot support modular arithmetic (RSA, DSS), elliptic curves, DES, AES; Hash functions barely feasible Recent progress on putting AES on RFID tag

RFID is the Barcode of the Future Fast, automated scanning (object doesn’t have to leave pocket, shelf or container) Line-of-sight reading Reader must be looking at the barcode Reading by radio contact Reader can be anywhere within range “Write Capabilities” Products carry updated info as they move through the supply chain Static Data No cryptographic operations possible Specifies object type E.g., “I am a pack of Juicy Fruit” Specifies unique object id E.g., “I am a pack of Juicy Fruit #86715-A” Can look up this object in the database

Commercial Applications of RFID Physical-access cards Inventory control Gillette Mach3 razor blades, pet tracking Logistics and supply-chain management Track a product from manufacturing through shipping to the retail shelf Gas station and highway toll payment Libraries Euro banknotes

The consumer privacy problem

…and the tracking problem Wig serial #A817TS8 Mr. Jones pays with a credit card; his RFID tags now linked to his identity; determines level of customer service Think of car dealerships using drivers’ licenses to run credit checks… Mr. Jones attends a political rally; law enforcement scans his RFID tags Mr. Jones wins Turing Award; physically tracked by paparazzi via RFID

Risks Personal privacy I’ll furtively scan your briefcase and learn how much cash you are carrying and which prescription medications you are taking … Corporate espionage : Privacy is not just a consumer issue Track your competitor’s inventory Skimming: read your tag and make my own In February, JHU-RSA Labs team skimmed and cloned Texas Instruments’ RFID device used in car anti-theft protection and SpeedPass gas station tokens

Blocking Unwanted Scanning FARADAY CAGE Container made of foil or metal mesh, impenetrable by radio signals of certain frequencies Invitation to Shoplifters Maybe works for a wallet, but huge hassle in general – locomotion difficult

Blocking Unwanted Scanning (Contd.) “KILL” tag after purchase Special command permanently de-activates tag after the product is purchased RFID tags are much too useful in “live” state… Disables many futuristic applications.

Futuristic Applications Tagged products Clothing, appliances, CDs, etc. tagged for store returns and locatable in house “Smart” appliances Refrigerators that automatically create shopping lists and when milk expires Closets that tell you what clothes you have available, and search the Web for advice on current styles, etc. Washing machines that detect improper wash cycle “Smart” print Airline tickets that indicate your location in the airport Business cards Recycling Plastics that sort themselves Consumers will not want their tags “killed,” but should still have a right to privacy!

Blocking Unwanted Scanning (Contd.) The “BLOCKER TAG” Blocker simulates all (billions of) possible tag serial numbers!! 1,2,3, …, 2023 pairs of sneakers and… (reading fails)…

How does blocker tag work? When the reader sends a signal, more than one RFID tag may respond: this is a collision Reader cannot accurately read information from more than one tag at a time Example: every tagged item in a supermarket cart responds to the cashier’s RFID reader “Tree-walking” protocol for identifying tags recursively asks question: “What is your next bit?” Blocker tag always says both ‘0’ and ‘1’! Guarantees collision no matter what tags are present To talk to a tag, reader must traverse every tree path With 128-bit IDs, reader must try 2128 values – infeasible! To prevent illegitimate blocking, make blocker tag selective (block only certain ID ranges) E.g., blocker tag blocks all IDs with first bit=1 Items on supermarket shelves have first bit=0 Can’t block tags on unpurchased items (anti-shoplifting) After purchase, flip first bit on the tag from 0 to 1

“Tree-walking” anti-collision protocol for RFID tags 1 ? 00 01 10 11 000 001 010 011 100 101 110 111

Example: Supermarket Cart 1. Prefix=“empty” Next=0 Next=1 Collision! prefix=0 prefix=1 No collision Next=1 1a. Prefix=0 1b. Prefix=1 Next=0 No collision 2. Prefix=00 2. Prefix=11 prefix=00 prefix=01 No collision Next=1 Collision! Next=1 Next=0 3. ID=001 Talk to tag 001 3a. ID=110 Talk to tag 110 prefix=10 prefix=11 3b. ID=111 Talk to tag 111 000 001 010 011 100 101 110 111

Pseudonym rotation Set of pseudonyms known only by trusted verifier Pseudonyms stored on tag Limited storage means at most, e.g., 10 pseudonyms Tag cycles through pseudonyms “74AB8” “MMW91” = ?

Hash Locks Reader RFID tag Why is this not a perfect solution? [Rivest, Weis, Sharma, Engels] Goal: authenticate reader to the RFID tag Reader “Who are you?” RFID tag metaID key Compute hash(key) and compare with stored metaID “My real ID is…” Stores metaID=hash(key) Stores key; hash(key) for any tag Unique key for each tag Why is this not a perfect solution?

Analysis of Hash Locks Relatively cheap to implement Tag has to store hash implementation and metaID Security based on weak collision-resistance of hash function metaID looks random Problem: tag always responds with the same value Attacker can track the same tag from place to place even if he cannot learn its real ID

Randomized Hash Locks Reader RFID tag [Weis et al.] Goal: authenticate reader to the RFID tag Reader RFID tag “Who are you?” Generate random R R, hash(R,IDk) Compute hash(R,IDi) for every known IDi and compare “You must be IDk” Stores its own IDk Stores all IDs: ID1, … ,IDn

Analysis of Randomized Hash Locks Tag must store hash implementation and pseudo-random number generator Secure against tracking because tag response is different each time Reader must perform brute-force ID search Effectively, reader must stage a mini-dictionary attack to unlock the tag Alternative: use a block cipher Need a very efficient implementation of AES

External re-encryption approach Suggested for RFID-embedded banknotes privacy protection Banknote tag serial numbers are encrypted with a law enforcement public key Periodic re-encryption to reduce the linkability of different appearances of a given tag. Resources limited on tag, so re-encryption done by external agents, usually the reader

References The material covered in the slides has been taken from : RFID Security and Privacy : http://www.google.co.in/url?sa=U&start=1&q=http://www.cs.utexas.edu/~shmat/courses/cs378_spring05/&e=9797 RFID: Security and Privacy for Five-Cent Computers : http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/five_cent/RFID_five%20cent.ppt

Questions ?