SlideShare a Scribd company logo
1 of 39
Faisal Razzak
Politecnico di Torino, e-Lite research group
http://elite.polito.it
RFID Protocol
   YA-TRAP [1] , YA-TRAP+ [2]
   A Zero knowledge RFID protocol [3]
   OSK/AO Schemes [4][5]
   Hash-Locks [6]
   O-TRAP [7]
Privacy of RFID Protocols.


           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
Yet Another- Trivial RFID Authentication
Protocol.
Inexpensive, untraceable identification of
RFID tags.
Used for Batch Mode.
Inspired by Herzberg work of
anonymous authentication of Mobile
users that move between domains [8].

           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
Susceptible to trivial DOS attacks.
Implicit assumption that a tag is never
authenticated more than once within the
same interval.




          RFID Protocols & privacy for RFID
                     protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
Focus on post purchase problem to
eliminate trade-of between convenience
and security by ensuring the device
owner control of information leakage.
Explain working ?




          RFID Protocols & privacy for RFID
                     protocols
Zero knowledge authentication Message:




Response (If authenticated)




            RFID Protocols & privacy for RFID
                       protocols
Can Zero-Knowledge Tags Protect
Privacy? [9]
Augmented Protocol
– Act as a toggle switch.
– Application specific commands could be
  added as a fourth instance.
– Changing SSDK .
– More SSDK.


           RFID Protocols & privacy for RFID
                      protocols
Setup
Interrogation
Identification




           RFID Protocols & privacy for RFID
                      protocols
Deterministic Hash-Locks
Randomized Hash-Locks.




          RFID Protocols & privacy for RFID
                     protocols
An optimistic , secure 1-pass anonymous
authentication protocol.
Optimistic means the security overhead is
minimal when the parties are honest.




           RFID Protocols & privacy for RFID
                      protocols
Secure Channel

Trusted            Reader                              Tag
 Server




                   RFID Protocols & privacy for RFID
                              protocols
MAC: Hki{.} be a pseudo-random
function.
Kill-keys
Timing Attacks




          RFID Protocols & privacy for RFID
                     protocols
MARP1 [10]
MARP2
Auth2 [11]
RIPP-FS [12]




          RFID Protocols & privacy for RFID
                     protocols
RFID Protocols & privacy for RFID
           protocols
Execute(R, T , i)
Send (U1, U2, i , m)
Corrupt (T, K)
TestUPriv (U,i)




           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
t0 max-time tmax0, t1 max-time tmax1
tmax0 < tmax1.
Learning
– Send tj = tmax0 to any T { to, t1}.
Challenge
– Send tj for tmaxo <tj < tmax1.
– If T=t0, response will be PRNG.(Not
  validated)
– If T=t1, response will be validated.
  HMACKi(tj)
              RFID Protocols & privacy for RFID
                         protocols
Cloning.




           RFID Protocols & privacy for RFID
                      protocols
Learning
– Send t0 with some rt and t, where t >>>> t0.
– Response = ri, h1 = Hk{00||t||rt}.
– Stops 2nd communication from Reader to
  Tag.
Challenge
– Send same t and rt
– If T=t0, response same like before.
– If T=t1, response will be different.
            RFID Protocols & privacy for RFID
                       protocols
Learning
– Send query to the tag T0 with random values
  rt repeatedly, causing tag to update its value
  to well in future.
Challenge
– Passive Role
– Execute Query to see if reader accepts the
  tag as valid. If not, then the adversary knows
  this is the marked tag.
– Conflict of view

            RFID Protocols & privacy for RFID
                       protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
Protocol modification to analyze if the
current tag counter differ more than d
from the previous counter.
Slowing rate of the responses




           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
A Zero Knowledge RFID protocol




                     RFID Protocols & privacy for RFID
                                protocols
Vulnerability in ZK with Shared Keys
Repairing ZK
Power analysis attack [14]
Logical layer silence does not imply RF
silence.




           RFID Protocols & privacy for RFID
                      protocols
Deterministic Hash lock
Randomized Hash lock




          RFID Protocols & privacy for RFID
                     protocols
Challenge: nonceR
response




          RFID Protocols & privacy for RFID
                     protocols
No replay attack .
Like OSK/AO, the tag does not store
internal state on nonceR.
No counter or timestamp that can be
manipulated like YA-TRAP.
It always yeild output unlike ZK.



          RFID Protocols & privacy for RFID
                     protocols
1.   G Tsudik , YA-TRAP: Yet another trivial RFID authentication
     protocolWorkshops, 2006. PerCom Workshops 2006.
2.    C Chatmon, T van Le and M Burmester , secure anonymous rfid authentication
     protocol Florida State University, 2006
3.    Engberg, S.J. and Harning, M.B. and Jensen, C.D., ero-knowledge device
     authentication: Privacy & security enhanced RFID preserving business value and
     consumer convenience, Second Annual Conference on Privacy, Security, and Trust
     , 2004.
4.    M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to privacy-
     friendly tags. In RFID Privacy Workshop, MIT, USA, 2003.
5.   G Avoine and P Oechslin , A scalable and provably secure Hash-based RFID
     Protocol, Third IEEE International Conference on Pervasive Computing and
     Communications Workshops, 2005.
6.    S Weis, S Sarma, R Rivest, D Engels , Security and privacy aspects of low-cost
     radio frequency identification systems Security in Pervasive Computing, 2004




                         RFID Protocols & privacy for RFID
                                    protocols
7. M Burmester, T Van Le, B De Medeiros , Provably secure ubiquitous systems:
       Universally composable RFID authentication protocol, Securecomm and
       Workshops, 2006
8. A.Herzberg, H.Krawczyk and G.Tsudil, On Travaling Incognito, IEE workshop on
       Mobile Systems and Applications, December 1994.
 9. F. Khan, Can Zero-Knowledge tags protect privacy, RFID Journal, 2005.
10. SC Kim, SS Yeo and S Kim, MARP: Mobile agent for rfid privacy protection, Smart
       Card Research and Advanced Applications – Springer
11. CC Tan, B Sheng, and Q Li, Severless search and authentication protocols
       for RFID, IEEE transactions on wireless communications, 2008 .
12. M Conti, RD Pietro, LV Mancini, RIPP-FS: An RFID Identification, Privacy
       Preserving Protocol with Forward SecrecyA Spognardi - Pervasive Computing and
       Communications workshop, 2007
 13. A Juels, SA Weis -, Defining Strong privacy for RFID, ACM Transactions on
       Information and System 2009
14. Khaled Ouafi and Raphael C. –W. Phan, Privacy of Recent RFID Authentication
       Protocols, Information Security Practice and Experience, 2008 - Springer

                         RFID Protocols & privacy for RFID
                                    protocols
Faisal Razzak
Faisal.razzak@polito.it

More Related Content

What's hot

Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identificationRavi Teja
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 
RFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksRFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksKartik Kachhadiya
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMavinash yada
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainExistco Pty Ltd
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationyuewingyan
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identificationbansarirajani
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfidEcwayt
 

What's hot (20)

RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
RFID technology fundamentals. How to choose an RFID tag?
RFID technology fundamentals. How to choose an RFID tag?RFID technology fundamentals. How to choose an RFID tag?
RFID technology fundamentals. How to choose an RFID tag?
 
RFID
RFIDRFID
RFID
 
What is rfid
What is rfidWhat is rfid
What is rfid
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksRFID and Wireless Sensor Networks
RFID and Wireless Sensor Networks
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply Chain
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID
RFIDRFID
RFID
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfid
 

Similar to RFID Protocols and Privacy Models for RFID

Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmAlexander Decker
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lrCecile Tan
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
RFID Project.pptx
RFID Project.pptxRFID Project.pptx
RFID Project.pptxAliNaim4
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Liz Sims
 
Rfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider CRfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider CJacky Fu
 
RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food SystemsMohsinAga1
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacyShahryar Ali
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemIJMTST Journal
 
Bluetooth rfid readers
Bluetooth rfid readersBluetooth rfid readers
Bluetooth rfid readersnephsystem
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 

Similar to RFID Protocols and Privacy Models for RFID (20)

Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
RFID Project.pptx
RFID Project.pptxRFID Project.pptx
RFID Project.pptx
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
Rfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider CRfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider C
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food Systems
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
RFID
RFIDRFID
RFID
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
 
Bluetooth rfid readers
Bluetooth rfid readersBluetooth rfid readers
Bluetooth rfid readers
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
RFID & IOT
RFID & IOTRFID & IOT
RFID & IOT
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 

More from Faisal Razzak

The Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart EnvironmentsThe Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart EnvironmentsFaisal Razzak
 
Recommendations for selection process automation in systematic reviews
Recommendations for selection process automation in systematic reviewsRecommendations for selection process automation in systematic reviews
Recommendations for selection process automation in systematic reviewsFaisal Razzak
 
WoD: Application for Ageing Society
WoD: Application for Ageing SocietyWoD: Application for Ageing Society
WoD: Application for Ageing SocietyFaisal Razzak
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics PosterFaisal Razzak
 

More from Faisal Razzak (6)

The Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart EnvironmentsThe Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart Environments
 
LO(D)D ant2012
LO(D)D ant2012LO(D)D ant2012
LO(D)D ant2012
 
Recommendations for selection process automation in systematic reviews
Recommendations for selection process automation in systematic reviewsRecommendations for selection process automation in systematic reviews
Recommendations for selection process automation in systematic reviews
 
2nd year PHD Report
2nd year PHD Report2nd year PHD Report
2nd year PHD Report
 
WoD: Application for Ageing Society
WoD: Application for Ageing SocietyWoD: Application for Ageing Society
WoD: Application for Ageing Society
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics Poster
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

RFID Protocols and Privacy Models for RFID

  • 1. Faisal Razzak Politecnico di Torino, e-Lite research group http://elite.polito.it
  • 2. RFID Protocol YA-TRAP [1] , YA-TRAP+ [2] A Zero knowledge RFID protocol [3] OSK/AO Schemes [4][5] Hash-Locks [6] O-TRAP [7] Privacy of RFID Protocols. RFID Protocols & privacy for RFID protocols
  • 3. RFID Protocols & privacy for RFID protocols
  • 4. Yet Another- Trivial RFID Authentication Protocol. Inexpensive, untraceable identification of RFID tags. Used for Batch Mode. Inspired by Herzberg work of anonymous authentication of Mobile users that move between domains [8]. RFID Protocols & privacy for RFID protocols
  • 5. RFID Protocols & privacy for RFID protocols
  • 6. Susceptible to trivial DOS attacks. Implicit assumption that a tag is never authenticated more than once within the same interval. RFID Protocols & privacy for RFID protocols
  • 7. RFID Protocols & privacy for RFID protocols
  • 8. RFID Protocols & privacy for RFID protocols
  • 9. Focus on post purchase problem to eliminate trade-of between convenience and security by ensuring the device owner control of information leakage. Explain working ? RFID Protocols & privacy for RFID protocols
  • 10. Zero knowledge authentication Message: Response (If authenticated) RFID Protocols & privacy for RFID protocols
  • 11. Can Zero-Knowledge Tags Protect Privacy? [9] Augmented Protocol – Act as a toggle switch. – Application specific commands could be added as a fourth instance. – Changing SSDK . – More SSDK. RFID Protocols & privacy for RFID protocols
  • 12. Setup Interrogation Identification RFID Protocols & privacy for RFID protocols
  • 13. Deterministic Hash-Locks Randomized Hash-Locks. RFID Protocols & privacy for RFID protocols
  • 14. An optimistic , secure 1-pass anonymous authentication protocol. Optimistic means the security overhead is minimal when the parties are honest. RFID Protocols & privacy for RFID protocols
  • 15. Secure Channel Trusted Reader Tag Server RFID Protocols & privacy for RFID protocols
  • 16. MAC: Hki{.} be a pseudo-random function. Kill-keys Timing Attacks RFID Protocols & privacy for RFID protocols
  • 17. MARP1 [10] MARP2 Auth2 [11] RIPP-FS [12] RFID Protocols & privacy for RFID protocols
  • 18. RFID Protocols & privacy for RFID protocols
  • 19. Execute(R, T , i) Send (U1, U2, i , m) Corrupt (T, K) TestUPriv (U,i) RFID Protocols & privacy for RFID protocols
  • 20. RFID Protocols & privacy for RFID protocols
  • 21. t0 max-time tmax0, t1 max-time tmax1 tmax0 < tmax1. Learning – Send tj = tmax0 to any T { to, t1}. Challenge – Send tj for tmaxo <tj < tmax1. – If T=t0, response will be PRNG.(Not validated) – If T=t1, response will be validated. HMACKi(tj) RFID Protocols & privacy for RFID protocols
  • 22. Cloning. RFID Protocols & privacy for RFID protocols
  • 23. Learning – Send t0 with some rt and t, where t >>>> t0. – Response = ri, h1 = Hk{00||t||rt}. – Stops 2nd communication from Reader to Tag. Challenge – Send same t and rt – If T=t0, response same like before. – If T=t1, response will be different. RFID Protocols & privacy for RFID protocols
  • 24. Learning – Send query to the tag T0 with random values rt repeatedly, causing tag to update its value to well in future. Challenge – Passive Role – Execute Query to see if reader accepts the tag as valid. If not, then the adversary knows this is the marked tag. – Conflict of view RFID Protocols & privacy for RFID protocols
  • 25. RFID Protocols & privacy for RFID protocols
  • 26. RFID Protocols & privacy for RFID protocols
  • 27. RFID Protocols & privacy for RFID protocols
  • 28. RFID Protocols & privacy for RFID protocols
  • 29. Protocol modification to analyze if the current tag counter differ more than d from the previous counter. Slowing rate of the responses RFID Protocols & privacy for RFID protocols
  • 30. RFID Protocols & privacy for RFID protocols
  • 31. RFID Protocols & privacy for RFID protocols
  • 32. A Zero Knowledge RFID protocol RFID Protocols & privacy for RFID protocols
  • 33. Vulnerability in ZK with Shared Keys Repairing ZK Power analysis attack [14] Logical layer silence does not imply RF silence. RFID Protocols & privacy for RFID protocols
  • 34. Deterministic Hash lock Randomized Hash lock RFID Protocols & privacy for RFID protocols
  • 35. Challenge: nonceR response RFID Protocols & privacy for RFID protocols
  • 36. No replay attack . Like OSK/AO, the tag does not store internal state on nonceR. No counter or timestamp that can be manipulated like YA-TRAP. It always yeild output unlike ZK. RFID Protocols & privacy for RFID protocols
  • 37. 1. G Tsudik , YA-TRAP: Yet another trivial RFID authentication protocolWorkshops, 2006. PerCom Workshops 2006. 2. C Chatmon, T van Le and M Burmester , secure anonymous rfid authentication protocol Florida State University, 2006 3. Engberg, S.J. and Harning, M.B. and Jensen, C.D., ero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience, Second Annual Conference on Privacy, Security, and Trust , 2004. 4. M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to privacy- friendly tags. In RFID Privacy Workshop, MIT, USA, 2003. 5. G Avoine and P Oechslin , A scalable and provably secure Hash-based RFID Protocol, Third IEEE International Conference on Pervasive Computing and Communications Workshops, 2005. 6. S Weis, S Sarma, R Rivest, D Engels , Security and privacy aspects of low-cost radio frequency identification systems Security in Pervasive Computing, 2004 RFID Protocols & privacy for RFID protocols
  • 38. 7. M Burmester, T Van Le, B De Medeiros , Provably secure ubiquitous systems: Universally composable RFID authentication protocol, Securecomm and Workshops, 2006 8. A.Herzberg, H.Krawczyk and G.Tsudil, On Travaling Incognito, IEE workshop on Mobile Systems and Applications, December 1994. 9. F. Khan, Can Zero-Knowledge tags protect privacy, RFID Journal, 2005. 10. SC Kim, SS Yeo and S Kim, MARP: Mobile agent for rfid privacy protection, Smart Card Research and Advanced Applications – Springer 11. CC Tan, B Sheng, and Q Li, Severless search and authentication protocols for RFID, IEEE transactions on wireless communications, 2008 . 12. M Conti, RD Pietro, LV Mancini, RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward SecrecyA Spognardi - Pervasive Computing and Communications workshop, 2007 13. A Juels, SA Weis -, Defining Strong privacy for RFID, ACM Transactions on Information and System 2009 14. Khaled Ouafi and Raphael C. –W. Phan, Privacy of Recent RFID Authentication Protocols, Information Security Practice and Experience, 2008 - Springer RFID Protocols & privacy for RFID protocols