Emerging Threats, RF-ID and eCrime issues. Pascal Chauvaud 28/06/2006.

Slides:



Advertisements
Similar presentations
Mike Fisher, ETSI TC CLOUD Chairman ETSI TC GRID / CLOUD.
Advertisements

ETSIs Collaboration with Academia and Research communities RFID and Telecommunication Services WORKSHOP 25 May 2004, ETSI, Sophia Antipolis Livia Rosu.
ITU-T 1 EU Commission Open Workshop – Identifying policy and regulatory issues of Next Generation Networks, Brussels 22 June 2005 Some comments on ITU-T.
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
IETF ECRIT SDO Emergency Services Coordination Workshop 5 & 6 Oct 2006 – New York Alain Van Gaever DG Information Society & Media European Commission.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
ETSI Security activities Charles Brookson Chairman OCG Security Source: ETSI GTSC-1 Agenda item For: Information GSC
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
BY DR. J.O. ATOYEBI NIGERIAN COMMUNICATIONS COMMISSION.
RFID technology in mobile applications Karol Hrudkay Transport Research Institute, Žilina, Slovak Republic.
G53SEC 1 Mobile Security GSM, UTMS, Wi-Fi and some Bluetooth.
An Analysis of The Mobile Market and Location-Based Services What About Wireless…?
1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
(Geneva, Switzerland, September 2014)
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Identity Cards: Strategy, Implementation & Challenges A Melodrama in Three Parts Simon Davies Director, Privacy International Visiting Fellow, London School.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
Global connectivity solutions for Consumer Connected Car Services
Chapter CHAPTER SEVEN OVERVIEW SECTION NETWORKS AND TELECOMMUNICATIONS  Network Basics  Voice over IP  Networking Businesses  Increasing.
Does Your 4G Device Communicate or Compute?. Advanced Antenna Technology for Ubiquitous Communication in Mobile Computing Devices Presented by: Paul Tornatta.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
GSC-19 Meeting, July 2015, Geneva Individual to Authority standardisation Chantal Bonardi, GSC-EM Task Force Convenor Document No:GSC-19_104a Source:GSC-EM.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
Methods of communication
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
A future global ODR system A future global ODR system A developing country perspective Mrs. Cécile Barayre ICT Analysis Section.
Chapter 7 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Networks, Telecommunications, and Mobile Technology.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
University of Murcia 8 June 2011 IPv6 in Europe Jacques Babot European Commission - DG INFSO Directorate, Emerging Technologies and Infrastructures.
Grid-based Sensor Network Service on Future Internet By Mohammad Mehedi Hassan Student ID:
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY CHAPTER 7 NETWORKS,
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
BUSINESS DRIVEN TECHNOLOGY Chapter Eighteen Creating a Wireless Organization.
CWNA Guide to Wireless LANs, Second Edition1 A Day in the Life of a Wireless User: Hotspots: Wireless local area network (WLAN Bluetooth wireless standard.
Ignite Presentation: Near Field Communication Harry Yang.
1 ICT Development ICT Development in the European Union: e Transport Mobil communication and Broadband Milan Dado University of Zilina, Slovakia Moderator.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SCOM 2007.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
1 Progress Report from NFC Working Group General Meeting Copenhagen 18 April 2013 Round Table 1.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Security activities in ETSI Presenter: Mike Sharpe, ETSI VP ESP (ETSI Standardization Projects) Document.
FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt
Technical and Policy Considerations for Unified European Emergency Services Presented at EENA Brussels, 6.7 June, 2007.
Mr C Johnston ICT Teacher G055 - Lecture 03 Local and Wide Area Networks.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Internet of Things in Industries
Chapter 1: Explore the Network
International Telecommunication Union ETSI Security Standardization Dr. Carmine Rizzo CISA, CISM, CISSP, ITIL, PRINCE2 ITU-T Workshop on “New challenges.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Security of the Internet of Things: perspectives and challenges
Chapter 1: Exploring the Network
ETSI Software Reconfiguration Overview
GSM, UTMS, Wi-Fi and some Bluetooth
Preventative Measures
Mobile RFID Topics in Internet JinKyu, Yoo
E-commerce and E-logistics Trends from an European perspective
Ubiquitous Computing Through Mass Adoption of RFID
Cloud & Developing Nations
Security and Privacy in Pervasive/Ubiquitous Computing Systems
RFID (Radio-Frequency Identification)
Presentation transcript:

Emerging Threats, RF-ID and eCrime issues. Pascal Chauvaud 28/06/2006

2 titre du document/date/confidentiel/auteur Existing telecommunications networks have been secure so far. Fixed Networks have been safe for many years. Mobile networks deployment was quite challenging but so far GSM and new 3G mobile phones have been really safe compared to computer world. Premium rate attacks or extensive use of subscription have been the most efficient attacks Networks are reliable and did not suffer of many successful denial of services attacks or disruptions

3 titre du document/date/confidentiel/auteur Why is it safer than the internet? Security a main concern since the beginning of GSM standardization Reliable physical address for fixed phones Reliable subscription address and information in the SIM cards Use of SIM and SIM Toolkit for most of the dangerous applications such like downloading parameters secured SMSs.

4 titre du document/date/confidentiel/auteur Security is of paramount importance for telecommunications -Important for the consumer confidence to keep as high as possible the security level of mobile networks (and any telecommunication networks) -Establish more trust in internet communications -Reliability of IP based communications needs to get improved. -New security mechanisms are standardised (ETSI, ITU-T, 3GPP, OMA, etc..) and needs to be used.

5 titre du document/date/confidentiel/auteur New Trends / Threats VOIP Voip communication are more and more widely used leading to new security concerns - Denial of service and disruption more likely. - Lawful interception more complicated and expansive. - etc… New services requiring security : egovernments services : more and more deployed and used in all european countries. All attacks already existing on the PC world may spread out on all telecommunications networks and services.

6 titre du document/date/confidentiel/auteur New trends / Threats Fixed/mobile convergence : Bimode phones WIFI/2G(3G), Wimax… Mobile phones more and more open to the internet and to usual threats of internet : Masquerading, Spamming, Viruses Organised crimes and misbehaviour Threatening, Blackmailing, etc All these new threats are incorporated in the changes in the threat list of the report.

7 titre du document/date/confidentiel/auteur RFID overview Radio frequency identification is a very promising technology offering the same services as very cheap contactless cards. One killer application for passive tags : stock and inventory control. Other applications : Nightclub access control in barcelona… Numerous potential applications requiring security and more sophisticated tags : - counterfeiting (genuineness of pharmaceuticals or high value plane/car parts), food chain control, coin/notes. Most of those services have strong privacy issues and impact on SMEs markets.

8 titre du document/date/confidentiel/auteur RFID security Tiny and cheap devices compared to strong cryptography costs. Strong cryptography is usually expansive in terms of storage and computations. Cheap solutions are needed for RFID. Implementation of secret key algorithms (AES based) are already quite expansive. Most of public key algorithms such as RSA are not possible. Some other algorithms have to be analysed and/or standardized. A subclause dedicated to RFID has been added to the report

9 titre du document/date/confidentiel/auteur RFID standardization today Passive tags : EPC global platform, Ubiquitious… Active tags : Lots of research papers and activities on the subject but no real standardisation. The deployment of passive tags is already there. Active tags and therefore secure services based on tags would gain from standardization progress.

10 titre du document/date/confidentiel/auteur E-CRIME Important problem since many crimes are much easier due to the "anonymous" side of internet. (proofs are difficult) International police cooperation has always been complicated and slow due to different legislation in each country. Unfortunately internet is very fast and without (almost) any borders. Therefore, there is a strong need for cooperation between all actors on an international level. For this report, a new section will be added.