ASIACCS 2007 Protecting RFID Communications in Supply Chains Yingjiu Li & Xuhua Ding School of Information Systems Singapore Management University.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Mitigate Unauthorized Tracking in RFID Discovery Service Qiang Yan 1, Robert H. Deng 1, Zheng Yan 2, Yingjiu Li 1, Tieyan Li 3 1 Singapore Management University,
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
1 An Ultra-lightweight Authentication Protocol in RFID Speaker: 魏家惠.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Queensland University of Technology CRICOS No J Mitigating Sandwich Attacks against a Secure Key Management in WSNs for PCS/SCADA Hani Alzaid, DongGook.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Replay protection in AKA with 2G RUIM Sarvar Patel and Zhibi Wang.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
RFID Security and Privacy Part 2: security example.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
YA-TRAP: Yet Another Trivial RFID Authentication Protocol Gene Tsudik International Conference on Pervasive Computing and Communications, PerCom 2006.
Chapter 9 Cryptographic Protocol Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li.
R R FID Authentication : M inimizing Tag Computation CHES2006 Rump Session, Yokohama. Japan Ph.D. Jin Kwak Kyushu University, JAPAN
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
- 1 - Secure and Serverless RFID Authentication and Search Protocols Chiu C. Tan, Bo Sheng, and Qun Li IEEE Transactions on Wireless Communication APRIL.
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
RFID Security without Extensive Cryptography Sindhu Karthikeyan Mikhail Nesterenko Kent State University SASN November 07, 2005.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
Chapter 4: Intermediate Protocols
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
Lecture 11: Strong Passwords
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
EPCglobal Network Security: Research Challenges and Solutions Yingjiu Li Assistant Professor School of Information Systems Singapore Management University.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia.
Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions Shaoying Cai 1 Yingjiu Li 1 Tieyan Li 2 Robert H. Deng 1 1 Singapore.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Denial-of-Service, Address Ownership,and,Early Authentication in IPv6 World (An Approach) Aditya Vutukuri From article by Pekka Nikander Ericsson Research.
Chapter Objectives LEARNING OBJECTIVES
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.
Presented by Sharan Dhanala
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Hoda Jannati School of Computer Science
RFID SECURITY.
ITU K ALEIDOSCOPE 2013 October 18, 2012 G RIFFIN – A PRIL 2013 IEEE Global Communications 2015 Conference IoTAAL Workshop - Sunday, December 6, 2015 Security.
1 Key-Exchange Protocol Using Pre-Agreed Session-ID Kenji Imamoto Kyushu University, JAPAN.
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
Security of the Internet of Things: perspectives and challenges
IP Addressing. A 32-bit logical naming convention A dotted-decimal notation is used: – –Each number represents 8 bits. Number is Part.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Secure Biometric Authentication for Weak Computational Devices Mikhail Atallah (Purdue),Keith Frikken (Purdue), Michael Goodrich (UC- Irvine), Roberto.
Cryptography and Network Security Chapter 13
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
Changshe Ma, Yingjiu Li, Robert Deng, Tieyan Li
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
Revisting Unpredictability-Based RFID Privacy Models
Radio-Frequency Identification (RFID)
Presentation transcript:

ASIACCS 2007 Protecting RFID Communications in Supply Chains Yingjiu Li & Xuhua Ding School of Information Systems Singapore Management University

ASIACCS Background RFID Each tag has a globally unique identification number. RFID tag has very weak computation power. RFID tag has very limited storage.

ASIACCS Supply Chain Management Supply Chain –A coordinated system of organizations moving a product from supplier to customer. Partner P1 Partner P2 Partner P3 Partner P4

ASIACCS Security Requirements Authoritative Access –For a shipment to partner P i, only P i ’ s reader can access. Authenticity –Only legitimate RIFD tags can be accepted Unlinkability –Infeasible to determine whether two responses are from the same tag. Supply Chain Visibility –Manager’s ability to track and identify the flow.

ASIACCS System Model Consider a supply chain of N partners –P 1, P 2,…P N –Each has a pair of public/private keys. –Material flow: P 1  P2  P 3 …  P N No assumption on global knowledge of the entire supply chain. Assumption: – Attackers are unable to access the stored secrets by physically compromising RFID readers or tags. –Attackers are able to eavesdrop the interaction between RFID tags and legitimate readers –Attackers are able to interrogate RFID tags arbitrary times.

ASIACCS The Protocol A high level view : P 1 initializes all RFID tags with a secret key from its next Partner. Partner P i downloads the list of ids from P i-1, reads all the tags, updates the tags for P i+1. P1P1 C1C1 C2C2 CnCn tags Tag Initialization C1k2C1k2 C2k2C2k2 Cnk2Cnk2 k 2 : the secret key chosen by P 2 Database initialization cncn c1c1 … ResponseSecret mask ID

ASIACCS RFID Read Protocol (by Partner P i ) h(r  c 2  k i ) c2c2  h(r  c x  k i ) r cxcx cncn h(r  c 1  k i ) c1c1 ResponseSecret mask ID  r t=H(r  )  =c x  k i PiPi t t ? database D i a a ’’ RFID tags

ASIACCS RFID Write Protocol (by Partner P i )  a=k i  k i+1 b=H(a  c  k i )  =c x  k i PiPi  r2r2 c2c2  h(r  c x  k i ) rxrx cxcx  rnrn cncn  r1r1 c1c1 ResponseSecret mask ID database D i RFID tag b H(a   ) ?  =a  = c x  k i+1

ASIACCS Security Read Protocol –The readers are NOT authenticated. –For a tag prepared for P i, only P i and P i-1 ’s reader can extract its ID. –Only legitimate tags are processed. Write Protocol –For a tag prepared for P i, only commands from P i and P i-1 will be accepted. –Reveal no information to eavesdroppers.

ASIACCS Balancing Security and Performance r1r1 PiPi a a  a a  a a  r2r2 r3r3 IDSecret mask Response c1c1 r 1 h(r 1  c 1  k i ) c2c2 r 1 h(r 1  c 2  k i ) cxcx r 2 h(r 2  c x  k i ) c x+1 r 2 h(r 2  c x+1  k i ) Basic Idea: Batch process with a shared nounce, instead of a fresh nounce per tag.

ASIACCS Unlinkability & Supply Chain Visibility Are they the same tag?? A weaker notion than universal unlinkability.  processed by Pi ’’  Supply Chain Visibility Unlinkability The ability to identify all tags and the present partner by introducing an trusted authority and key escrow

ASIACCS Performance Tag’s storage cost: <128 bits Tag’s computation cost: 1 hash + 1 XOR for read; 1 hash + 2 XOR for write Communication cost among Partners: the list of tag identifications, (not the whole database) Computation cost for a Partner: –only hash, XOR and comparison are needed; –A major portion can be pre-computed; –suitable for batch processes; –Practical, since the bottleneck is the tag-reader communication delay;

ASIACCS