210 likes | 334 Views
Modelling Privacy for Off-line RFID Systems. Flavio Garcia Radboud University Nijmegen together with Peter van Rossum RFIDSec 2009. Outline. Current RFID privacy models A new model for off-line RFID systems that considers reader corruption Forward and self-stabilizing backwards privacy
E N D
Modelling Privacy for Off-line RFID Systems FlavioGarcia Radboud University Nijmegen together with Peter van Rossum RFIDSec 2009
Outline • Current RFID privacy models • A new model for off-line RFID systems that considers reader corruption • Forward and self-stabilizing backwards privacy • Protocols • Conclusions
Current RFID Models Permanent secure connexion Fwd-Privacy • Juels and Weis (2006) • Vaudenay (2007) • Avoine (2005)
Fwd-Privacy Time Safe Un-Safe
Many real systems are more complex What kind of security can still be guaranteed? Periodic connexion More information on the readers
An adversary is a PPTA with access to the set of oracles O: • CreateReader(R) • CreateTag(T) • Launch(R) • Send(m,A) • Result() • CorruptTag(T) • Sync() O+ = O {DestroyReader(R)}
Fwd and Bwd-Privacy Safe Un-Safe Safe Unachievable! (Unless extra assumptions are made)
Forward and Self-stabilizing Backwards Private Protocol (idea) new day! BO K ← h(k) K ← h(k) K ← h(k’+1) K’ ← h(k’) K to `talk’ with the reader K’ to `talk’ with the BO MAC using k’
Conclusions • model for (off-line) RFID systems in the presence of reader corruption • forward and self-stabilizing backwards private protocols that uses only hash functions. • De-sync resilience