1 / 38

Tracking technologies 14 MARCH

COMP 381. Tracking technologies 14 MARCH. Wireless Technologies. RFID Infrared: 5m, line of sight Bluetooth: 10m WiFi: 30m Cellphone: 10k GPS: reach satellite, line of sight. GPS. Global Positioning System U.S . space-based system World-wide services positioning navigation timing.

king
Download Presentation

Tracking technologies 14 MARCH

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COMP 381 Tracking technologies14 MARCH

  2. Wireless Technologies • RFID • Infrared: 5m, line of sight • Bluetooth: 10m • WiFi: 30m • Cellphone: 10k • GPS: reach satellite, line of sight

  3. GPS • Global Positioning System • U.S. space-based system • World-wide services • positioning • navigation • timing

  4. Components of GPS 24 satellites receiver and data bases galore with GPS coordinated

  5. GPS Well Accepted Uses Emergency Tracking • Marine Vessels • Personal GPS Locator Transportation Safety • Aviation • Automobiles Criminal Tracking • House arrest • Enhanced probation • Enforce prohibitions National Security • Port Security • Military Tracking

  6. And others… • Parents tracking their kids • Cellphone tracking • Hidden GPS in teens cars • Companies tracking vehicles and drivers • Dispatchers are privy to private information • Being tracked without knowing • Spouses tracking each other

  7. What is RFID? Tag Reader

  8. Passive vs Active • Passive • Power only from reader  • No battery  • Smaller • Active • Power from tag and reader  • On board battery • Larger

  9. Current RFID ranges • Passive • Shorter range • Between 1 ft and 4 ft  • Restricted by strength of reader magnetic field • Active • Longer range • Up to 50 ft • Restricted by material interference

  10. Applications Product tracking • Livestock • Library books • WalMart EZ Pass Nightclubs in Barcelona Security in Mexico Pets • ID chip • Pet door Medical • Tracking drugs • Matching patients with drugs/procedures • Emergency medical information • Surgical sponges • Alzheimer patients Gun control

  11. RFID Exploits • Eavesdropping • Impersonation • Data tampering • Information theft

  12. RFID Hacks • Your credit card info: $8 • Your passport info: $250 • Free gas for life: $280

  13. Cryptography solutions • Objectives • Confidentiality • Integrity • Standard techniques • encryption • challenge-response

  14. Message Message Secure Message Secure Message Information Transmission Attack Trusted Third Party arbiter, distributor of secret information Sender Receiver Secret Information Secret Information Security related transformation Information channel Opponent

  15. Key Technologies • Encryption -> Confidentiality • Before 1976 private (secret) key • Public key introduced in 1976 (Diffie & Hellman) • Authentication -> Integrity • Digital Signature: Sender cannot deny having sent message (non-repudiation) • Kerberos: Central server issues identity voucher

  16. Encryption ENCRYPTION PLAINTEXT CIPHERTEXT KEY DECRYPTION

  17. Types of Attacks

  18. Levels of Encryption • Unconditionally Secure • Unlimited resources + unlimited time • Plaintext CANNOT be recovered from ciphertext • Computationally Secure • Cost of breaking exceeds information value • Time to break exceeds useful lifetime

  19. Sender, receiver share common key Private Key

  20. Techniques • Substitution ciphers • Transposition ciphers (rearrange bits) • Combinations of the two basic types

  21. Caesar Cipher • Substitute the letter 3 ahead for each one • Example: • Et tu, Brute • Hw wx, Euxwh • Quite sufficient for its time • High illiteracy • New idea

  22. Enigma Machine(Germany, World War II) • Simple Caesar cipher through each rotor • But rotors shifted at different rates • Roller 1 rotated one position after every encryption • Roller 2 rotated every 26 times… http://russells.freeshell.org/enigma/

  23. Attack Mechanisms • Brute force • Statistical analysis • Knowledge of natural language • All English words have vowels • There are only 2 1-letter words in English • High probability that u follows q • …

  24. DES (Data Encryption Standard) • Government standard • History: • First version 1976 • Replaced with AES in 2001 • Longer keys, computationally harder • Cracking: • 1998: EFF supercomputer 56 hrs • 1999: Distributed.net 22 hrs • Today: $1M specialized hardware <1 hr

  25. Two keys: one private, one public Public Key

  26. Public Key Cryptography • Two keys • Private key known only to individual • Public key available to anyone • Public key, private key inverses • Confidentiality • encipher using public key • decipher using private key • Integrity/authentication • encipher using private key • decipher using public one

  27. Popular Public Key Systems • RSA • Rivest, Shamir, and Adelman • MIT professors 1977 • PGP • Pretty Good Privacy • Zimmerman 1991 • Freeware Versions

  28. Surveillance

  29. Video Surveillance • Brief History: • Press suggested use by police as early as 1965. • 1969: Use in NYC. Became quite popular

  30. Video Surveillance – Government • Law enforcement

  31. Video Surveillance - Britain • 4.2 Million Closed Circuit Television Cameras currently in Britain • Britain ranks worst among Western nations about guarding privacy…. • …but compared to the World suddenly not so bad…. • Scotland Yard’s New Strategy….will it work?

  32. Video Surveillance - Private • Private retail stores and businesses use cameras for security purposes World’s Dumbest Criminal (for your amusement) http://www.youtube.com/watch?v=_quStvTNynI • UNC http://its2.unc.edu/resnet/webcams/ • And lots more http://www.earthcam.com/

  33. Definition of Privacy • pri·va·cy: freedom from unauthorized intrusion: state of being let alone and able to keep certain personal matters to oneself

  34. Facial Recognition • Government • London CCTVs • Tampa PD • Airports • Private • Casinos • iPhoto

  35. Wiretapping Brief History 2008 2001 1928

  36. Facts and Stats • Average cost in 2008: $47,624 • Total cost 2008: $81 million • Total cost 1988: $355 million • Convictions 2008: 810 of 4133 arrests • Convictions 1998-2008: 56%

  37. Opportunity for Misuse • Greek government had over 100 cell phones tapped by an unknown source • AT&T caught working with NSA to tap American conversations in 2003

  38. Orwell’s 1984 • There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.

More Related