Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

SMUCSE 7349 RFID Security. SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War.
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
Department of Computer Science University of Virginia The Practicality of Multi-Tag RFID Systems Leonid Bolotnyy Scott Krize Gabriel Robins.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Adaptive Splitting Protocols for RFID Tag Collision Arbitration Jihoon Myung and Wonjun Lee ACM Mobihoc 06.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Topic 3: Sensor Networks and RFIDs Part 3 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
1 EPCglobal Training Suite. 2 Introduction Tag Protocol - UHF Class 1 Gen 2 Ultra High Frequency (UHF) Generation 2 (Generation 1 is deprecated) Class.
RFID Cardinality Estimation with Blocker Tags
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID Object Localization Gabriel Robins and Kirti Chawla Department of Computer Science University of Virginia
Created by the Community for the Community Building a RFID solution in BTS 09.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Radio Frequency Identification Inventory Tracking and Status Monitoring of Blood Units Team 10 Mark Green Melissa Kronenberger Nadine Tribur Aaron Schlanser.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
Anti-tag collision algorithms of RFID
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
Developing RFID Application In Supply Chain
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
Particle Filter-Assisted Positioning Method for Identifying RFID-Tag Implanted in the Organism Gen Imai*, Katsushi Matsuda*, Hiromi Takahata and Minoru.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems Ishtiaq Rouf, Hossen Mustafa Rob Miller Marco Grutese Presented By.
Issues in Integrated Circuit Design for UHF RFID Zhihua WANG,Xuguang SUN, Chun ZHANG,Yongming LI Institute of Microelectronics, Tsinghua University,Beijing,100084,P.R.China.
Classroom Collaborator Brandon Reagen, Matthew Ng, Runfeng Chen, Robert Connelly Faculty Advisor: Prof. Tessier Department of Electrical and Computer Engineering.
EPCglobal Training Suite
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
University of Pennsylvania Electrical and Systems Engineering Department ABSTRACT: The last decade has seen the expansion of computer usage from scientific.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
RFID (RADIO FREQUENCY IDENTIFICATION)
Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Radio Frequency Identification
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
RFID SECURITY.
Radio Frequency Identification (RFID)
New Directions in Detection, Security and Privacy for RFID
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Network Processing Systems Design
3506-D WEST LAKE CENTER DRIVE,
Introduction Wireless devices offering IP connectivity
The University of Adelaide, School of Computer Science
The Practicality of Multi-Tag RFID Systems
Bluetooth, RFID, Data Link Layer Switching
Ubi-Glove: A WISP-based Multi-purpose Ubiquitous Computing Tool
Chat Refs: RFC 1459 (IRC).
Combating Tag Cloning with COTS RFID Devices
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Randomized PRF Tree Walking Algorithm for Secure RFID
Chapter 9 - A Comparison of TTF and RTF UHF RFID Protocols
RFID Object Localization
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to Radio Frequency Identification (RFID) Systems Multi-Tag RFID Systems Randomized PRF Tree Walking Algorithm Randomized Tree Walking Algorithm School of Engineering & Applied Science  Attach more than one tag to an object  Redundant Tags  Dual-Tags  Private memory only  Shared memory only  Shared and private memory  n-Tags  Dual-Tags Coordinated Reply  Reader-Tag Communication  RFID Primer  Three types of RFID tags  Passive  Active  Semi-Active  Operational Frequencies  125KHz - 5.8GHz  Operational Range  5mm - 15m  Standardization Bodies  International Organization for Standardization  EPCglobal, Inc  EPC System Architecture Tag ID  Applications Secure Binary Tree-Walking i.Each tag generates a random number ii.Reader performs a tree-walk iii.Selected tag transmits its real ID  Major questions:  How to deal with collisions on the tags’ real-IDs?  How to choose the optimal length for random numbers?  How to select the threshold?  Optimal Random Number Length Use average n over many traverse runs Goal: Efficiently solve reader-tag authentication problem in the presence of many tags  Applications of Multi-Tags  Supply chain management  to increase chances of object detection  Luggage tracking  regulations require different algorithms  Preventing illegal deforestation  tagging of trees to prevent illegal logging BinaryNo Effect Binary VariantNo Effect RandomizedDoubles Time**No Effect* STACCauses DOSNo Effect* Slotted AlohaDoubles Time**No Effect* * If Dual-Tags communicate to form a single response ** Assuming an object is tagged with two tags  Effect on Singulation Algorithms AlgorithmRedundant TagsDual-Tags  Reliability and Dependability  Object’s detection is more likely  Failure of a redundant tag  leaves the system functional  is detectable in some systems 1.Each tag generates a random number, and the reader performs a tree-walk on these numbers 2. Once a tag is selected, the reader and the tag engage in a tree-waking private authentication protocol 3. The reader moves the tag to a different position in a tree.  Time and Space Complexity n is the total number of tags in the system  Steps of the algorithm  Security Enhancement  n-Tags send “chaff” hiding the real IDs  Recycled IDs are good “chaff” source  “Chaffing and winnowing” has a cost  extra tag functionality  overhead to create and filter “chaff”  Optimal Tag Positioning  Benefits of Multi-tags  Increased expected voltage on a tag  Increased expected communication range  Increased memory  Increased reliability  Increased durability  Major Research Issues  Reducing the cost of tags  Providing security and privacy  Standardizing the technology tag antenna signal Inductive CouplingFar-Field Propagation signal  Threshold Selection  Start the threshold at 2  Increase threshold by 1 if a collision occurs  Decrease threshold by 1 if no collisions occur for entire traversal : represents our improvement as shown : represents our improvement with some modifications : represents related work improvement Tag B-field Inductive Coupling: Far-Field Propagation:  Future Work  Field testing of Multi-tags  Identifying new applications of Multi-tags  Improving hardware complexity of the algorithm  Developing new efficient authentication algorithms Reader Tag Eavesdropper Backward Range Forward Range ONS Server Infrastructure Object Server Server IP Tag ID ID Info Tag ID ONS Server TagsReader Local Server  Random Number Generation Hardware The voltage signal is amplified, disturbed, stretched, and sampled, resulting in random bits.  Properties  Allows tags addition and removal from the system  Provides security against active eavesdroppers  Offers security against active readers  Enables dynamic tradeoff between security, privacy, and singulation time  Effective against active attacks:  stealing a tag  tracking and hotlisting Tag1 Reader Tag1, Tag2 Tag2 Request Data1, Power1 Tag2 Tag1 Data2, Power2 Tag1:if(Data1 == Data2) { if(Power1 >= Power2) { Reader Data1 } else { Reader Data1, Error } Tag2: Same procedure as Tag1 (note: probability that the Power1 == Power2 is tiny) } V Random Bits No Connect  Expected Largest Angle of Incidence Leonid Bolotnyy and Gabriel Robins