A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions Advanced Information Systems Engineering Lab Saitama University,

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

1 An Ultra-lightweight Authentication Protocol in RFID Speaker: 魏家惠.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
IP Traceback in Cloud Computing Through Deterministic Flow Marking Mouiad Abid Hani Presentation figures are from references given on slide 21. By Presented.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 67 - ANCP WG November 5-10, 2006 draft-moustafa-ancp-security-threats-00.txt.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
RFID Security CMPE 296T -Sankate Sharma -Sangbeom Ryu.
Privacy: Challenges and Opportunities Tadayoshi Kohno Department of Computer Science and Engineering University of Washington.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Applied Cryptography for Network Security
Wireless Sensor Network Security Anuj Nagar CS 590.
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Cloud based Secure.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
© Synergetics Portfolio Security Aspecten.
EPCglobal Network Security: Research Challenges and Solutions Yingjiu Li Assistant Professor School of Information Systems Singapore Management University.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
8/30/2010CS 686 Definition of Security/Privacy EJ Jung CS 686 Special Topics in CS Privacy and Security.
1 授課教授:黃秋煌 學生:賴志勇 學號: M Source: This work was published as an abstract in the proceedings of 2007 Symposium on Cryptography and Information.
Sensorweb Research Laboratory Georgia State University Fundamentals of Computer Security Song Tan Georgia State University.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Hoda Jannati School of Computer Science
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Advanced Science and Technology Letters Vol.40 (Healthcare and Nursing 2013), pp Requirement of Authentication.
Network Security Introduction
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 RFID Security Nicholas Alteen Computer Science Program Florida Gulf.
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Information Management System Ali Saeed Khan 29 th April, 2016.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Advanced Science and Technology Letters
Cloud Testing Shilpi Chugh.
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Amar B. Patel , Shushan Zhao
Security and Privacy in Pervasive/Ubiquitous Computing Systems
Presentation transcript:

A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions Advanced Information Systems Engineering Lab Saitama University, Japan 2008-April-17 K.H.S Sabaragamu Koralalage and J. Cheng Department of Information and Computer Sciences, Saitama University, Japan {krishan,

Agenda POP Architecture The Problem Goal Evaluation Conclusion Future Works

17-April-2008ISA What is POP What is Product-flow with Ownership-transferring Protocol A comprehensive mechanism used to ensure the security and privacy of the passive RFID systems used in a product lifecycle How Tagged-product flow with an anonymous ownership transference Robust communicational protocol

17-April-2008ISA How to change the ownership PRIVACY SECURITY KaKa SaSa EPC E KbKb SbSb E KdKd SdSd E KeKe SeSe E KfKf SfSf E KgKg SgSg E KhKh ShSh E KiKi SiSi E KjKj SjSj E KkKk SkSk E KlKl SlSl E E E E KcKc ScSc E

17-April-2008ISA The Problem Position of POP Architecture ? Level of Security ? Level of Privacy ? Level of Functionality ?

17-April-2008ISA Goal and Objectives Goal Compare and contrast previously proposed RFID solutions against the POP Architecture Objectives 1. Define security criterion 2. Define privacy criterion 3. Define desired functionalities 4. Evaluate available RFID Solutions

17-April-2008ISA Previous Solutions 1. Faraday Cage[1] 2. Blocker Tag[1] 3. Active Jamming[1] 4. Frequency Modification[12] 5. Kill Tag[1] 6. RFID Guardian[10] 7. Renaming[3] 8. Hash Based Schemes[12,11,9] 9. Delegated Pseudonym[7] 10. Zero knowledge[5] 11. Re-encryption Method[8,2]

17-April-2008ISA Security Objectives Authentication Authorization Confidentiality Anonymity Data Integrity No-Repudiation Availability Forward Security Anti-Cloning Anti-Reverse Engineering

17-April-2008ISA Achievement of security objectives

17-April-2008ISA Attacking RFID Tags Attacking Interrogators Access-key/Cipher-text Tracing Eavesdropping Spoofing Man-in-the-middle Replay Attack Brute-force Attacks Security Attacks

17-April-2008ISA Protection Against the attacks

17-April-2008ISA Corporate espionage Competitive marketing Action threat Association threat Location threat Preference threat Constellation threat Transaction threat Breadcrumb threat Privacy Threats

17-April-2008ISA Protection against privacy threats

17-April-2008ISA Interoperability Reliability Usability Feasibility Scalability Manage new and damaged tags Control Accessing Transfer ownership online/offline Achieve multiple authorizations Recycle the tagged products Desired Functionalities

17-April-2008ISA Functional Abilities

17-April-2008ISA Evaluation POP Achieves Highest security objectives, attack prevention throughout the product lifecycle Highest protection against the privacy threats Highest interoperability Highest level of feasibility, scalability, manageability of new and damaged tags and self controllability Resolve multiple authorizations issue

17-April-2008ISA Evaluation No solution provides both online/offline anonymous ownership transference other than POP But POP yields for universal customer card and PIN only for after purchase use

17-April-2008ISA Our evaluation reveals that the POP Architecture is the best out of all those solutions as no one provides such level of achievement so far. Conclusion

17-April-2008ISA Future Works We hope to analyze the performance of POP Tags in following aspects Computational Overhead Storage Overhead Communication Overhead Cost Overhead

17-April-2008ISA Thank you very much for your attention !!!..... Please feel free to ask questions…………or put forward your opinions……..

17-April-2008ISA Q & A

17-April-2008ISA Thank you

17-April-2008ISA K. H. S. Sabaragamu Koralalage and Jingde Cheng: A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions, Proceedings of the 2nd International Conference on Information Security and Assurance (ISA '08), pp , Busan, Korea, IEEE Computer Society Press, April 2008.