SlideShare une entreprise Scribd logo
1  sur  39
Faisal Razzak
Politecnico di Torino, e-Lite research group
http://elite.polito.it
RFID Protocol
   YA-TRAP [1] , YA-TRAP+ [2]
   A Zero knowledge RFID protocol [3]
   OSK/AO Schemes [4][5]
   Hash-Locks [6]
   O-TRAP [7]
Privacy of RFID Protocols.


           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
Yet Another- Trivial RFID Authentication
Protocol.
Inexpensive, untraceable identification of
RFID tags.
Used for Batch Mode.
Inspired by Herzberg work of
anonymous authentication of Mobile
users that move between domains [8].

           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
Susceptible to trivial DOS attacks.
Implicit assumption that a tag is never
authenticated more than once within the
same interval.




          RFID Protocols & privacy for RFID
                     protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
Focus on post purchase problem to
eliminate trade-of between convenience
and security by ensuring the device
owner control of information leakage.
Explain working ?




          RFID Protocols & privacy for RFID
                     protocols
Zero knowledge authentication Message:




Response (If authenticated)




            RFID Protocols & privacy for RFID
                       protocols
Can Zero-Knowledge Tags Protect
Privacy? [9]
Augmented Protocol
– Act as a toggle switch.
– Application specific commands could be
  added as a fourth instance.
– Changing SSDK .
– More SSDK.


           RFID Protocols & privacy for RFID
                      protocols
Setup
Interrogation
Identification




           RFID Protocols & privacy for RFID
                      protocols
Deterministic Hash-Locks
Randomized Hash-Locks.




          RFID Protocols & privacy for RFID
                     protocols
An optimistic , secure 1-pass anonymous
authentication protocol.
Optimistic means the security overhead is
minimal when the parties are honest.




           RFID Protocols & privacy for RFID
                      protocols
Secure Channel

Trusted            Reader                              Tag
 Server




                   RFID Protocols & privacy for RFID
                              protocols
MAC: Hki{.} be a pseudo-random
function.
Kill-keys
Timing Attacks




          RFID Protocols & privacy for RFID
                     protocols
MARP1 [10]
MARP2
Auth2 [11]
RIPP-FS [12]




          RFID Protocols & privacy for RFID
                     protocols
RFID Protocols & privacy for RFID
           protocols
Execute(R, T , i)
Send (U1, U2, i , m)
Corrupt (T, K)
TestUPriv (U,i)




           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
t0 max-time tmax0, t1 max-time tmax1
tmax0 < tmax1.
Learning
– Send tj = tmax0 to any T { to, t1}.
Challenge
– Send tj for tmaxo <tj < tmax1.
– If T=t0, response will be PRNG.(Not
  validated)
– If T=t1, response will be validated.
  HMACKi(tj)
              RFID Protocols & privacy for RFID
                         protocols
Cloning.




           RFID Protocols & privacy for RFID
                      protocols
Learning
– Send t0 with some rt and t, where t >>>> t0.
– Response = ri, h1 = Hk{00||t||rt}.
– Stops 2nd communication from Reader to
  Tag.
Challenge
– Send same t and rt
– If T=t0, response same like before.
– If T=t1, response will be different.
            RFID Protocols & privacy for RFID
                       protocols
Learning
– Send query to the tag T0 with random values
  rt repeatedly, causing tag to update its value
  to well in future.
Challenge
– Passive Role
– Execute Query to see if reader accepts the
  tag as valid. If not, then the adversary knows
  this is the marked tag.
– Conflict of view

            RFID Protocols & privacy for RFID
                       protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
Protocol modification to analyze if the
current tag counter differ more than d
from the previous counter.
Slowing rate of the responses




           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
A Zero Knowledge RFID protocol




                     RFID Protocols & privacy for RFID
                                protocols
Vulnerability in ZK with Shared Keys
Repairing ZK
Power analysis attack [14]
Logical layer silence does not imply RF
silence.




           RFID Protocols & privacy for RFID
                      protocols
Deterministic Hash lock
Randomized Hash lock




          RFID Protocols & privacy for RFID
                     protocols
Challenge: nonceR
response




          RFID Protocols & privacy for RFID
                     protocols
No replay attack .
Like OSK/AO, the tag does not store
internal state on nonceR.
No counter or timestamp that can be
manipulated like YA-TRAP.
It always yeild output unlike ZK.



          RFID Protocols & privacy for RFID
                     protocols
1.   G Tsudik , YA-TRAP: Yet another trivial RFID authentication
     protocolWorkshops, 2006. PerCom Workshops 2006.
2.    C Chatmon, T van Le and M Burmester , secure anonymous rfid authentication
     protocol Florida State University, 2006
3.    Engberg, S.J. and Harning, M.B. and Jensen, C.D., ero-knowledge device
     authentication: Privacy & security enhanced RFID preserving business value and
     consumer convenience, Second Annual Conference on Privacy, Security, and Trust
     , 2004.
4.    M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to privacy-
     friendly tags. In RFID Privacy Workshop, MIT, USA, 2003.
5.   G Avoine and P Oechslin , A scalable and provably secure Hash-based RFID
     Protocol, Third IEEE International Conference on Pervasive Computing and
     Communications Workshops, 2005.
6.    S Weis, S Sarma, R Rivest, D Engels , Security and privacy aspects of low-cost
     radio frequency identification systems Security in Pervasive Computing, 2004




                         RFID Protocols & privacy for RFID
                                    protocols
7. M Burmester, T Van Le, B De Medeiros , Provably secure ubiquitous systems:
       Universally composable RFID authentication protocol, Securecomm and
       Workshops, 2006
8. A.Herzberg, H.Krawczyk and G.Tsudil, On Travaling Incognito, IEE workshop on
       Mobile Systems and Applications, December 1994.
 9. F. Khan, Can Zero-Knowledge tags protect privacy, RFID Journal, 2005.
10. SC Kim, SS Yeo and S Kim, MARP: Mobile agent for rfid privacy protection, Smart
       Card Research and Advanced Applications – Springer
11. CC Tan, B Sheng, and Q Li, Severless search and authentication protocols
       for RFID, IEEE transactions on wireless communications, 2008 .
12. M Conti, RD Pietro, LV Mancini, RIPP-FS: An RFID Identification, Privacy
       Preserving Protocol with Forward SecrecyA Spognardi - Pervasive Computing and
       Communications workshop, 2007
 13. A Juels, SA Weis -, Defining Strong privacy for RFID, ACM Transactions on
       Information and System 2009
14. Khaled Ouafi and Raphael C. –W. Phan, Privacy of Recent RFID Authentication
       Protocols, Information Security Practice and Experience, 2008 - Springer

                         RFID Protocols & privacy for RFID
                                    protocols
Faisal Razzak
Faisal.razzak@polito.it

Contenu connexe

Tendances

Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identificationRavi Teja
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 
RFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksRFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksKartik Kachhadiya
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMavinash yada
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainExistco Pty Ltd
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationyuewingyan
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identificationbansarirajani
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfidEcwayt
 

Tendances (20)

RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
RFID technology fundamentals. How to choose an RFID tag?
RFID technology fundamentals. How to choose an RFID tag?RFID technology fundamentals. How to choose an RFID tag?
RFID technology fundamentals. How to choose an RFID tag?
 
RFID
RFIDRFID
RFID
 
What is rfid
What is rfidWhat is rfid
What is rfid
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksRFID and Wireless Sensor Networks
RFID and Wireless Sensor Networks
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply Chain
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID
RFIDRFID
RFID
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfid
 

Similaire à RFID Protocols and Privacy Models for RFID

Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmAlexander Decker
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
RFID Project.pptx
RFID Project.pptxRFID Project.pptx
RFID Project.pptxAliNaim4
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Liz Sims
 
Rfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider CRfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider CJacky Fu
 
RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food SystemsMohsinAga1
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacyShahryar Ali
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemIJMTST Journal
 
Bluetooth rfid readers
Bluetooth rfid readersBluetooth rfid readers
Bluetooth rfid readersnephsystem
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 

Similaire à RFID Protocols and Privacy Models for RFID (20)

Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
RFID Project.pptx
RFID Project.pptxRFID Project.pptx
RFID Project.pptx
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
Rfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider CRfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider C
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food Systems
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
RFID
RFIDRFID
RFID
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
 
Bluetooth rfid readers
Bluetooth rfid readersBluetooth rfid readers
Bluetooth rfid readers
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
RFID & IOT
RFID & IOTRFID & IOT
RFID & IOT
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 

Plus de Faisal Razzak

The Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart EnvironmentsThe Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart EnvironmentsFaisal Razzak
 
Recommendations for selection process automation in systematic reviews
Recommendations for selection process automation in systematic reviewsRecommendations for selection process automation in systematic reviews
Recommendations for selection process automation in systematic reviewsFaisal Razzak
 
WoD: Application for Ageing Society
WoD: Application for Ageing SocietyWoD: Application for Ageing Society
WoD: Application for Ageing SocietyFaisal Razzak
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics PosterFaisal Razzak
 

Plus de Faisal Razzak (6)

The Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart EnvironmentsThe Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart Environments
 
LO(D)D ant2012
LO(D)D ant2012LO(D)D ant2012
LO(D)D ant2012
 
Recommendations for selection process automation in systematic reviews
Recommendations for selection process automation in systematic reviewsRecommendations for selection process automation in systematic reviews
Recommendations for selection process automation in systematic reviews
 
2nd year PHD Report
2nd year PHD Report2nd year PHD Report
2nd year PHD Report
 
WoD: Application for Ageing Society
WoD: Application for Ageing SocietyWoD: Application for Ageing Society
WoD: Application for Ageing Society
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics Poster
 

Dernier

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Dernier (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

RFID Protocols and Privacy Models for RFID

  • 1. Faisal Razzak Politecnico di Torino, e-Lite research group http://elite.polito.it
  • 2. RFID Protocol YA-TRAP [1] , YA-TRAP+ [2] A Zero knowledge RFID protocol [3] OSK/AO Schemes [4][5] Hash-Locks [6] O-TRAP [7] Privacy of RFID Protocols. RFID Protocols & privacy for RFID protocols
  • 3. RFID Protocols & privacy for RFID protocols
  • 4. Yet Another- Trivial RFID Authentication Protocol. Inexpensive, untraceable identification of RFID tags. Used for Batch Mode. Inspired by Herzberg work of anonymous authentication of Mobile users that move between domains [8]. RFID Protocols & privacy for RFID protocols
  • 5. RFID Protocols & privacy for RFID protocols
  • 6. Susceptible to trivial DOS attacks. Implicit assumption that a tag is never authenticated more than once within the same interval. RFID Protocols & privacy for RFID protocols
  • 7. RFID Protocols & privacy for RFID protocols
  • 8. RFID Protocols & privacy for RFID protocols
  • 9. Focus on post purchase problem to eliminate trade-of between convenience and security by ensuring the device owner control of information leakage. Explain working ? RFID Protocols & privacy for RFID protocols
  • 10. Zero knowledge authentication Message: Response (If authenticated) RFID Protocols & privacy for RFID protocols
  • 11. Can Zero-Knowledge Tags Protect Privacy? [9] Augmented Protocol – Act as a toggle switch. – Application specific commands could be added as a fourth instance. – Changing SSDK . – More SSDK. RFID Protocols & privacy for RFID protocols
  • 12. Setup Interrogation Identification RFID Protocols & privacy for RFID protocols
  • 13. Deterministic Hash-Locks Randomized Hash-Locks. RFID Protocols & privacy for RFID protocols
  • 14. An optimistic , secure 1-pass anonymous authentication protocol. Optimistic means the security overhead is minimal when the parties are honest. RFID Protocols & privacy for RFID protocols
  • 15. Secure Channel Trusted Reader Tag Server RFID Protocols & privacy for RFID protocols
  • 16. MAC: Hki{.} be a pseudo-random function. Kill-keys Timing Attacks RFID Protocols & privacy for RFID protocols
  • 17. MARP1 [10] MARP2 Auth2 [11] RIPP-FS [12] RFID Protocols & privacy for RFID protocols
  • 18. RFID Protocols & privacy for RFID protocols
  • 19. Execute(R, T , i) Send (U1, U2, i , m) Corrupt (T, K) TestUPriv (U,i) RFID Protocols & privacy for RFID protocols
  • 20. RFID Protocols & privacy for RFID protocols
  • 21. t0 max-time tmax0, t1 max-time tmax1 tmax0 < tmax1. Learning – Send tj = tmax0 to any T { to, t1}. Challenge – Send tj for tmaxo <tj < tmax1. – If T=t0, response will be PRNG.(Not validated) – If T=t1, response will be validated. HMACKi(tj) RFID Protocols & privacy for RFID protocols
  • 22. Cloning. RFID Protocols & privacy for RFID protocols
  • 23. Learning – Send t0 with some rt and t, where t >>>> t0. – Response = ri, h1 = Hk{00||t||rt}. – Stops 2nd communication from Reader to Tag. Challenge – Send same t and rt – If T=t0, response same like before. – If T=t1, response will be different. RFID Protocols & privacy for RFID protocols
  • 24. Learning – Send query to the tag T0 with random values rt repeatedly, causing tag to update its value to well in future. Challenge – Passive Role – Execute Query to see if reader accepts the tag as valid. If not, then the adversary knows this is the marked tag. – Conflict of view RFID Protocols & privacy for RFID protocols
  • 25. RFID Protocols & privacy for RFID protocols
  • 26. RFID Protocols & privacy for RFID protocols
  • 27. RFID Protocols & privacy for RFID protocols
  • 28. RFID Protocols & privacy for RFID protocols
  • 29. Protocol modification to analyze if the current tag counter differ more than d from the previous counter. Slowing rate of the responses RFID Protocols & privacy for RFID protocols
  • 30. RFID Protocols & privacy for RFID protocols
  • 31. RFID Protocols & privacy for RFID protocols
  • 32. A Zero Knowledge RFID protocol RFID Protocols & privacy for RFID protocols
  • 33. Vulnerability in ZK with Shared Keys Repairing ZK Power analysis attack [14] Logical layer silence does not imply RF silence. RFID Protocols & privacy for RFID protocols
  • 34. Deterministic Hash lock Randomized Hash lock RFID Protocols & privacy for RFID protocols
  • 35. Challenge: nonceR response RFID Protocols & privacy for RFID protocols
  • 36. No replay attack . Like OSK/AO, the tag does not store internal state on nonceR. No counter or timestamp that can be manipulated like YA-TRAP. It always yeild output unlike ZK. RFID Protocols & privacy for RFID protocols
  • 37. 1. G Tsudik , YA-TRAP: Yet another trivial RFID authentication protocolWorkshops, 2006. PerCom Workshops 2006. 2. C Chatmon, T van Le and M Burmester , secure anonymous rfid authentication protocol Florida State University, 2006 3. Engberg, S.J. and Harning, M.B. and Jensen, C.D., ero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience, Second Annual Conference on Privacy, Security, and Trust , 2004. 4. M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to privacy- friendly tags. In RFID Privacy Workshop, MIT, USA, 2003. 5. G Avoine and P Oechslin , A scalable and provably secure Hash-based RFID Protocol, Third IEEE International Conference on Pervasive Computing and Communications Workshops, 2005. 6. S Weis, S Sarma, R Rivest, D Engels , Security and privacy aspects of low-cost radio frequency identification systems Security in Pervasive Computing, 2004 RFID Protocols & privacy for RFID protocols
  • 38. 7. M Burmester, T Van Le, B De Medeiros , Provably secure ubiquitous systems: Universally composable RFID authentication protocol, Securecomm and Workshops, 2006 8. A.Herzberg, H.Krawczyk and G.Tsudil, On Travaling Incognito, IEE workshop on Mobile Systems and Applications, December 1994. 9. F. Khan, Can Zero-Knowledge tags protect privacy, RFID Journal, 2005. 10. SC Kim, SS Yeo and S Kim, MARP: Mobile agent for rfid privacy protection, Smart Card Research and Advanced Applications – Springer 11. CC Tan, B Sheng, and Q Li, Severless search and authentication protocols for RFID, IEEE transactions on wireless communications, 2008 . 12. M Conti, RD Pietro, LV Mancini, RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward SecrecyA Spognardi - Pervasive Computing and Communications workshop, 2007 13. A Juels, SA Weis -, Defining Strong privacy for RFID, ACM Transactions on Information and System 2009 14. Khaled Ouafi and Raphael C. –W. Phan, Privacy of Recent RFID Authentication Protocols, Information Security Practice and Experience, 2008 - Springer RFID Protocols & privacy for RFID protocols