1 / 12

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels. Introduction. RFID system primer Security and Privacy Risks RFID security Settings and Assumptions Security Proposals

kato-dyer
Download Presentation

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels

  2. Introduction • RFID system primer • Security and Privacy Risks • RFID security Settings and Assumptions • Security Proposals • Hash-Based Access Control • Randomized Access Control • Silent Tree Walking and Backward Channel Key Negotiation

  3. RFID system primer(1/2) • The RFID tag (or transponder), carries object identifying data. • The RFID reader (or transceiver), reads and writes tag data. • The back-end database associates records with tag data collected by readers.

  4. RFID system primer(2/2) • Memory on tags may be read-only, write-once read-many, or fully rewritable. • The readers may contain internal storage, processing power, or an additional functionality. • The tags may either be actively or passively powered.

  5. Security and privacy risks(1/1) • Unprotected tags may have vulnerabilities to eavesdropping, traffic analysis, spoofing or denial of service.

  6. RFID security settings and assumptions • Assuming tags will be passive and provide only simple read-only identification functionality and tags contain a few hundred bits of storage and have an operating range of a few meters. • Assuming tag memory is insecure and susceptible to physical attacks revealing their entire contents. • The readers are assumed to have a secure connection to a back-end database.

  7. Security proposals(1/3) • Hash-based access control • Each hash-enabled tag has a temporary metaID and it can operate in either a locked or unlocked state. • To lock a tag, the tag hash a random key as the tag’s metaID, i.e. hash (key)  metaID. Then it stores both the key and metaID in a back-end database. While locked, a tag responds to all queries with only its metaID and offers no other functionality. • To unlock a tag, the reader queries the metaID from the tag, find a suitable key and send the key to the tag. The tag checks whether the correctness of the key. If the values match, it unlocks itself and offers its full functionality to any nearby readers.

  8. Security proposals(2/3) • Randomized access control • In this mode, a tag must not respond to unauthorized users but must be identifiable by legitimate readers. This scheme based on one-way hash functions best suited for a small number of tags and it offers a theoretically stronger pseudo-random functions (PRFs). • The tags respond to reader with the pair (r, h (ID|| r)), where r is a random number chosen uniformly at random and hashing its ID concatenated with r. Then the reader perform a brute-force search of its known IDs until it finds a match.

  9. Security proposals(3/3) • Silent tree walking and backward channel key negotiation

More Related