170 likes | 329 Views
RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006. Taesung Kim 2008.10.28. Contents. RFID Overview Tags, Readers, and Applications Tag Singulation Security & Privacy Threats Proposed Solutions.
E N D
RFID Security and Privacy:A Research SurveyAri JuelsRSA LaboratoriesIEEEJournal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim 2008.10.28
Contents • RFID Overview • Tags, Readers, and Applications • Tag Singulation • Security & Privacy Threats • Proposed Solutions
RFID Overview 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from 3-5 inches to 3 yards Tags (transponders) Attached to objects, “call out” identifying data on a special radio frequency Reader (transceiver) Reads data off the tags without direct contact Database Matches tag IDs to physical objects 3
Tag Types • Passive: • All power comes from a reader’s signal • Tags are inactive unless a reader activates them • Cheaper and smaller, but shorter range • Semi-passive • On-board battery, but cannot initiate communication • Can serve as sensors, collect information from environment: for example, “smart dust” for military applications • Active: • On-board battery power • Can record sensor readings or perform calculations in the absence of a reader • Longer read range
Applications • Supply-chain management • logistics, inventory control, retail check-out • Payment systems • ExxonMobil SpeedPass • I-Pass/EZ-Pass toll systems • Credit Cards • Access Control • Passports • Library books • Animal Tracking
Security Challenge • Low cost RFID tags have very limited resources • Typically have only 500-5,000 gates • May have up to a few hundred bits of storage • Tags cannot perform complex computations • Most tags simply emit a static identifier when prompted • Tags do not have the resources to allow for public-key or symmetric-key encryption systems • EPC tags: $0.05, 250 – 1000 gates • AES requires 20,000 – 30,000 gates
Threats • Tracking • Unauthorized use of a tag’s ID in order to gain information about the location of a person or object • In a retail environment, a user can be associated with an item at purchase time • Cloning/Replay • Tags that emit static identifiers are very vulnerable • A thief could replace/rewrite a tag on an expensive item • Denial-of-service • Conflicting RF signals can prevent legitimate tag communication • Physical attacks • Probing a tag to determine private data
RFID Security Research Practical approach Blocking approach Clipped Tag Minimalist Proxy model “kill” “sleep/wake” Faraday Cage Active Jamming Re-labelling Blocker Tag Hash-Lock Randomized Hash-Lock - Watchdog Tag - RFID Guardian - RFID Enhancer Human authentication approach Cryptographic protocol approach OSK model MW model HM model LK model HB and HB+ protocol HB++(first attempt) and HB++ protocol HB++ protocol by S. Piramuthu HB#
“kill” 기법과 “sleep/wake” 기법 • “kill” and “sleep/wake” approach • “kill” • Stop tag’s operation • Throw up the convenience of RFID system • “sleep/wake” • Stop tag’s operation • Reused through wake command
Re-Labelling기법 • Inoue and Yarsuura’s approach • Splitting product-type identifiers and unique identifiers across two RFID tags • Karjoth & Moskowiz’s approach
Minimalist 기법 ID = 가명 8 <Tag에 대한 첫 번째 request> 가명 1 가명 2 가명 2 request request 가명 n 가명 3 response 가명8 response 가명2 …… 가명 4 가명 5 ? ? ? ? ? <Tag에 대한 두번째 request> 가명 1 가명 2 request request 가명 n 가명 3 response 가명n response 가명5 …… 가명 4 가명 5 가명 5
Hash-Lock 기법 • Hash-Lock approach • Step 1 : Lock State of the tag changes to Lock (metaID1, K1) (metaID2, K2) … (metaIDn, Kn) Tag Tag Reader Database ID Select random key K and operate Hash Function metaID = HK(ID) metaID metaID, K Stores metaID and key K set to identify tags
Hash-Lock 기법 • Hash-Lock approach • Step 2 : Unlock Tag state : Lock (metaID) (metaID1, K1) (metaID2, K2) … (metaIDn, Kn) Tag state : Unlock (ID) Give pure information of this tag Tag Tag Reader Database query metaID metaID Key, ID Finds key, ID set by metaID Key ID
RFID Guardian • Scan logging : 인접 리더의 쿼리에 대한 감시 • Tag logging : 태그의 ownership 제공 및 새로운 태그의 출현 감지 • Tag-reader mediation • Selective jamming • Context-awareness • 시간/장소에 따라 알맞은 context로 갱신