SlideShare a Scribd company logo
Security & Blockchain Track
March 7, 2018
Integrity of Things:
Exploring NFC and Blockchain
Ajit Kulkarni
VP of Product, Chronicled
Stephane Ardiley; Director
Product Management, Identiv
Global Supply Chains are inefficient and riddled with
issues.
Counterfeiting alone is a global $2Tn problem.
What is Blockchain?
Blockchain for Supply Chain: How it Works
High Value Products: Secure Sealing
Cryptoseal
Temp Sensitive Products: Cold Chain
Logistics
TempLogger
Introducing Temperature Logger
Cloud Service
• Label management, configuration,
and temperature profiles
• Collects and stores records in
database
• Cloud-based analytics and
remediation Integrity check of
temperature records
Mobile App
• Tag activation and setup
• Online/offline option
• Local analytics with graph
• Android-based app available via
Google Play
• Compatible with Moto X, Nexus,
LGE, Samsung (S5 and up), and Sony
Ericsson Xperia
Label
• Low-cost, self-adhesive
• Precise temperature sensor
• Digital storage
• Flexible battery
• NFC-enabled
Smart Sensor Label
• Small credit card-sized NFC label for temperature data logging
• Thin, flexible battery
• Temperature: -30 to 50˚C (-22 to 122 ˚F)
• Battery life: Up to 8 months
• Log capacity: >10,000 (can exceed 30,000)
• Configurable logging interval
• NXP NHS3100 with embedded accurate temperature sensor
• Protected temperature records (target CFR21 part 11)
• ISO/IEC 17025 temperature calibration procedure
• Programmable software/firmware to support additional use cases,
i.e. alarm setup, record only extreme temperatures, etc.
Developed by:
Trusted IoT & Smart Supply Chain
Solutions
A Peer-to-Peer Approach to Digital Key
Sharing for Vehicle Access & Control
Tony Rosati
Director of IOT Security, ESCRYPT
Agenda
• Motivation for Digital Key Sharing
• Architecture
• Security Model
• Security Analysis
• Future Work
Smartphone Access Control & Key
Sharing
• No need to
manage physical
keys
• Desire/Need to use
the Smartphone
• Vehicle sharing
• Security alerts
• Control/Status
Car Sharing Growth
• Cars are increasingly too
costly to own in the urban
environment
• Cars sit unused most of the
time
• Many new services:
• BMW Drivenow,
• Avis: Zip Car,
• Daimler: Car2Go,
• Uber,
• Lyft
Smartphone/Vehicle Integration
Vehicle Access
• NFC and/or Bluetooth
• Security of the smartphone?
Enable
• Wireless Charging
Bluetooth Handoff
• Vehicle personalization
Consumers Expect a Seamless User
Experience
Connected Car Consortium Model
ESCRYPT CycurACCESS Architecture
• Leverage Public Key Infrastructure (PKI)
• Enables efficient digital key sharing
• Issue Identity Certificates
• Massively scalable
• Leverage Mobile Platform Security
• Secure Boot
• Secure Key Store (hardware level attestation)
• Sandboxing
• Code Signing
Key Sharing Server
Owner
Smartphone
Friend
Smartphone
Certificate Authority
Cellular/
WiFi
NFC/BLE
TSM
Proving Identity
• Certificate Authority provides a root of trust
• Identity certificates are issued to each user
and each vehicle
• Vehicle certificates issued in production
• User Certificates issued at registration
• Entities in the system can now verify each
other’s identity securely and efficiently
• Verification can be performed offline
Establishing Ownership
• Each vehicle is assigned a random Ownership
Code during manufacture
• The owner and the vehicle exchange
certificates & a challenge to prove identity
• The owner sends the Ownership Code to the
vehicle to prove ownership
• If valid, vehicle stores new owner certificate for
future use
• Vehicle generates and forwards signed
“proof” to KSS via the owner to confirm new
ownership
Ownership Code
12345678901234
56789012345678
90121234123
1231245124343
Ownership Code
12345678901234
56789012345678
90121234123
1231245124343
Key Sharing Server
(KSS)
Gaining Access
• To unlock the vehicle, the
owner and vehicle begin by
exchanging certificates & a
challenge to prove identity
• The vehicle verifies the identity
against stored owner
certificate. If so, access is
granted
Owner
Key Sharing
• Owner creates and signs Sharing Permission
containing Vehicle ID, serial number of
friend’s Identity certificate and any
restrictions
• Owner forwards Sharing Permission to the
friend via the KSS or P2P
• Note that the KSS does not have to be
involved in this process
Key Sharing Server
Owner Friend
Shared Access
• To unlock the vehicle, the friend and vehicle begin by
exchanging certificates & a challenge to prove identity
• The friend sends the Sharing Permission to the vehicle
• The vehicle verifies that the following is true of the Permission:
• Issued for this vehicle
• Issued to the friend
• Signed by the owner
• No restrictions are violated
• If checks pass, access is granted
Friend
Car Sharing Service
• All vehicles are owned by the service
• All valid members are issued permissions
• The vehicle verifies that the following is true of the Permission:
• Issued for this vehicle
• Issued to the member
• Signed by the service
• No restrictions are violated
• If checks pass, access is granted
• How do we revoke bad actors?
Members
Key Sharing Server
Revoke a Permission
• To revoke a Permission, the owner generates a
signed revocation request and forwards to the
KSS
• If valid, the KSS generates a revocation
notification and forwards to the friend’s device
• Friend’s device deletes the affected Permission
Key Sharing Server
Owner Friend
Dealing with Cheaters
• What if the friend is
dishonest?
• Friend takes their device
offline to prevent the
Permission from being deleted
• How does a car know that a
permission is revoked?
• What can be done to
mitigate this?
• Three ideas:
• Next time the owner unlocks the
vehicle, a list of recently revoked
Permissions can be transferred to the
vehicle
• Permissions could require a periodic
authorization from the KSS to remain
valid. (Say every 24 hours)
• A connected car receives revocations
directly
Security Analysis/Threat Model
• Based on the work of
Symeonidis et al.
• Main Features
• Private keys are never
transported & stored in SE
• KSS compromise cant be used
to gain or share access
• Most operations are performed
offline which limits the attack
surface (ie Denial-of-Service)
Key Sharing Server
Owner
Smartphone
Friend
Smartphone
Certificate Authority
Cellular/
WiFi
NFC/BLE
Relay Attack
• Mitigation Strategies
• Easy
• User based preference
• Smartphone screen off
• Hard
• RF Finger Print
• Distance Bounding
• Brands and Chaum 1994 – smart cards
• Gambs et al 2016 – smartphones
• Can detect adversary constantly > 1.5ms relay
Vehicle Owner Attacker 1 Attacker 2
Conclusion & Future Work
• A new approach digital Key Sharing
• Using well-known PKI & modern smartphone security
• Most operations are done offline to limit the attack surface
• Futures
• Hardware level Key Attastation
• Relay Attack Countermeasures
• Thank you
• tony.rosati@escrypt.com

More Related Content

What's hot

VISIONFC Automotive Summit
VISIONFC Automotive SummitVISIONFC Automotive Summit
VISIONFC Automotive Summit
NFC Forum
 
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
NFC Forum
 
RFID Journal Live! 2019
RFID Journal Live! 2019RFID Journal Live! 2019
RFID Journal Live! 2019
NFC Forum
 
Cashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanCashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in Japan
NFC Forum
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC Forum
 
Digital reality nxp final.pptx
Digital reality nxp final.pptxDigital reality nxp final.pptx
Digital reality nxp final.pptx
MIT Enterprise Forum Cambridge
 
Razorfish nfc technologies presentation 2013
Razorfish nfc technologies presentation 2013Razorfish nfc technologies presentation 2013
Razorfish nfc technologies presentation 2013
Razorfish
 
HCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a TransactionHCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a Transaction
NFC Forum
 
Mwc 2013 a devices review
Mwc 2013 a devices reviewMwc 2013 a devices review
Mwc 2013 a devices review
MTKDMI
 
Visionfc payment transport summit final complete public
Visionfc payment  transport summit final complete   publicVisionfc payment  transport summit final complete   public
Visionfc payment transport summit final complete public
NFC Forum
 
History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...
NFC Forum
 
Visionfc payment transport summit final complete public
Visionfc payment  transport summit final complete   publicVisionfc payment  transport summit final complete   public
Visionfc payment transport summit final complete public
NFC Forum
 
Tap into NFC Showcase - Shanghai
Tap into NFC Showcase - ShanghaiTap into NFC Showcase - Shanghai
Tap into NFC Showcase - Shanghai
NFC Forum
 
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Team
 
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
NFC Forum
 
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive
 
Tap & Connect: How NFC Enhances the IoT
Tap & Connect: How NFC Enhances the IoTTap & Connect: How NFC Enhances the IoT
Tap & Connect: How NFC Enhances the IoT
NFC Forum
 
Mobiz Technologies services
Mobiz Technologies servicesMobiz Technologies services
Mobiz Technologies services
Bruno Zysman
 
MasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFCMasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFC
NFC Forum
 
Near field communication & Branding
Near field communication & BrandingNear field communication & Branding
Near field communication & Branding
Niels Mulder
 

What's hot (20)

VISIONFC Automotive Summit
VISIONFC Automotive SummitVISIONFC Automotive Summit
VISIONFC Automotive Summit
 
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
 
RFID Journal Live! 2019
RFID Journal Live! 2019RFID Journal Live! 2019
RFID Journal Live! 2019
 
Cashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanCashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in Japan
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
 
Digital reality nxp final.pptx
Digital reality nxp final.pptxDigital reality nxp final.pptx
Digital reality nxp final.pptx
 
Razorfish nfc technologies presentation 2013
Razorfish nfc technologies presentation 2013Razorfish nfc technologies presentation 2013
Razorfish nfc technologies presentation 2013
 
HCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a TransactionHCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a Transaction
 
Mwc 2013 a devices review
Mwc 2013 a devices reviewMwc 2013 a devices review
Mwc 2013 a devices review
 
Visionfc payment transport summit final complete public
Visionfc payment  transport summit final complete   publicVisionfc payment  transport summit final complete   public
Visionfc payment transport summit final complete public
 
History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...
 
Visionfc payment transport summit final complete public
Visionfc payment  transport summit final complete   publicVisionfc payment  transport summit final complete   public
Visionfc payment transport summit final complete public
 
Tap into NFC Showcase - Shanghai
Tap into NFC Showcase - ShanghaiTap into NFC Showcase - Shanghai
Tap into NFC Showcase - Shanghai
 
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
 
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
 
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
 
Tap & Connect: How NFC Enhances the IoT
Tap & Connect: How NFC Enhances the IoTTap & Connect: How NFC Enhances the IoT
Tap & Connect: How NFC Enhances the IoT
 
Mobiz Technologies services
Mobiz Technologies servicesMobiz Technologies services
Mobiz Technologies services
 
MasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFCMasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFC
 
Near field communication & Branding
Near field communication & BrandingNear field communication & Branding
Near field communication & Branding
 

Similar to Connections Summit - Security & Blockchain Track

How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
GlobalSign
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
Hai Nguyen
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architecture
Vinod Wilson
 
JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...
PROIDEA
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
itnewsafrica
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
Maganathin Veeraragaloo
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
Donald Malloy
 
Access management
Access managementAccess management
Access management
Venkatesh Jambulingam
 
Netmera_Presentation.pdf
Netmera_Presentation.pdfNetmera_Presentation.pdf
Netmera_Presentation.pdf
Mustafa Kuğu
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
Arash Ramez
 
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
New York Public Transit Association
 
Web authentication
Web authenticationWeb authentication
Web authentication
Pradeep J V
 
Context Based Authentication
Context Based AuthenticationContext Based Authentication
Context Based Authentication
PortalGuard dba PistolStar, Inc.
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain Service
Juarez Junior
 
LKMUG - Azure Blockchain for Developers
LKMUG - Azure Blockchain for DevelopersLKMUG - Azure Blockchain for Developers
LKMUG - Azure Blockchain for Developers
Juarez Junior
 
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License PresentantionOpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
MikeLeszcz
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
FinTech Belgium
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
Ping Identity
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
Mark Diodati
 
E-Business security
E-Business security E-Business security
E-Business security
Surendhranatha Reddy
 

Similar to Connections Summit - Security & Blockchain Track (20)

How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architecture
 
JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
 
Access management
Access managementAccess management
Access management
 
Netmera_Presentation.pdf
Netmera_Presentation.pdfNetmera_Presentation.pdf
Netmera_Presentation.pdf
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
 
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
 
Web authentication
Web authenticationWeb authentication
Web authentication
 
Context Based Authentication
Context Based AuthenticationContext Based Authentication
Context Based Authentication
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain Service
 
LKMUG - Azure Blockchain for Developers
LKMUG - Azure Blockchain for DevelopersLKMUG - Azure Blockchain for Developers
LKMUG - Azure Blockchain for Developers
 
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License PresentantionOpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
 
E-Business security
E-Business security E-Business security
E-Business security
 

More from NFC Forum

NFC Forum Technology Roadmap Webinar Slides
NFC Forum Technology Roadmap Webinar SlidesNFC Forum Technology Roadmap Webinar Slides
NFC Forum Technology Roadmap Webinar Slides
NFC Forum
 
NFC Forum Healthcare Webinar
NFC Forum Healthcare WebinarNFC Forum Healthcare Webinar
NFC Forum Healthcare Webinar
NFC Forum
 
NFC Forum Wireless Charging Webinar
NFC Forum Wireless Charging WebinarNFC Forum Wireless Charging Webinar
NFC Forum Wireless Charging Webinar
NFC Forum
 
Beyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleBeyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at Scale
NFC Forum
 
NFC Charging for Enterprise Class Devices
NFC Charging  for Enterprise Class DevicesNFC Charging  for Enterprise Class Devices
NFC Charging for Enterprise Class Devices
NFC Forum
 
The Commons Project
The Commons ProjectThe Commons Project
The Commons Project
NFC Forum
 
SpokenRX Use Case
SpokenRX Use CaseSpokenRX Use Case
SpokenRX Use Case
NFC Forum
 
Innovative NFC Use Cases
Innovative NFC Use CasesInnovative NFC Use Cases
Innovative NFC Use Cases
NFC Forum
 
How eBay Achieved a 90% Customer Satisfaction Rate with NFC
How eBay Achieved a 90% Customer Satisfaction Rate with NFCHow eBay Achieved a 90% Customer Satisfaction Rate with NFC
How eBay Achieved a 90% Customer Satisfaction Rate with NFC
NFC Forum
 
NFC Forum Story
NFC Forum StoryNFC Forum Story
NFC Forum Story
NFC Forum
 
ABI Research NFC Consumer Experience Survey Results
ABI Research NFC Consumer Experience Survey ResultsABI Research NFC Consumer Experience Survey Results
ABI Research NFC Consumer Experience Survey Results
NFC Forum
 
NFC Forum Certification Program Webinar
NFC Forum Certification Program WebinarNFC Forum Certification Program Webinar
NFC Forum Certification Program Webinar
NFC Forum
 
Connecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
Connecting the Unconnected: The Unique Power of NFC in IoT Data AcquisitionConnecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
Connecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
NFC Forum
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
NFC Forum
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
NFC Forum
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
NFC Forum
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
NFC Forum
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
NFC Forum
 
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
NFC Forum
 
NFC Forum User Experience Survey Update
NFC Forum User Experience Survey UpdateNFC Forum User Experience Survey Update
NFC Forum User Experience Survey Update
NFC Forum
 

More from NFC Forum (20)

NFC Forum Technology Roadmap Webinar Slides
NFC Forum Technology Roadmap Webinar SlidesNFC Forum Technology Roadmap Webinar Slides
NFC Forum Technology Roadmap Webinar Slides
 
NFC Forum Healthcare Webinar
NFC Forum Healthcare WebinarNFC Forum Healthcare Webinar
NFC Forum Healthcare Webinar
 
NFC Forum Wireless Charging Webinar
NFC Forum Wireless Charging WebinarNFC Forum Wireless Charging Webinar
NFC Forum Wireless Charging Webinar
 
Beyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleBeyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at Scale
 
NFC Charging for Enterprise Class Devices
NFC Charging  for Enterprise Class DevicesNFC Charging  for Enterprise Class Devices
NFC Charging for Enterprise Class Devices
 
The Commons Project
The Commons ProjectThe Commons Project
The Commons Project
 
SpokenRX Use Case
SpokenRX Use CaseSpokenRX Use Case
SpokenRX Use Case
 
Innovative NFC Use Cases
Innovative NFC Use CasesInnovative NFC Use Cases
Innovative NFC Use Cases
 
How eBay Achieved a 90% Customer Satisfaction Rate with NFC
How eBay Achieved a 90% Customer Satisfaction Rate with NFCHow eBay Achieved a 90% Customer Satisfaction Rate with NFC
How eBay Achieved a 90% Customer Satisfaction Rate with NFC
 
NFC Forum Story
NFC Forum StoryNFC Forum Story
NFC Forum Story
 
ABI Research NFC Consumer Experience Survey Results
ABI Research NFC Consumer Experience Survey ResultsABI Research NFC Consumer Experience Survey Results
ABI Research NFC Consumer Experience Survey Results
 
NFC Forum Certification Program Webinar
NFC Forum Certification Program WebinarNFC Forum Certification Program Webinar
NFC Forum Certification Program Webinar
 
Connecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
Connecting the Unconnected: The Unique Power of NFC in IoT Data AcquisitionConnecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
Connecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
 
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
 
NFC Forum User Experience Survey Update
NFC Forum User Experience Survey UpdateNFC Forum User Experience Survey Update
NFC Forum User Experience Survey Update
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Connections Summit - Security & Blockchain Track

  • 1. Security & Blockchain Track March 7, 2018
  • 2. Integrity of Things: Exploring NFC and Blockchain Ajit Kulkarni VP of Product, Chronicled Stephane Ardiley; Director Product Management, Identiv
  • 3. Global Supply Chains are inefficient and riddled with issues.
  • 4. Counterfeiting alone is a global $2Tn problem.
  • 6. Blockchain for Supply Chain: How it Works
  • 7. High Value Products: Secure Sealing Cryptoseal
  • 8. Temp Sensitive Products: Cold Chain Logistics TempLogger
  • 9. Introducing Temperature Logger Cloud Service • Label management, configuration, and temperature profiles • Collects and stores records in database • Cloud-based analytics and remediation Integrity check of temperature records Mobile App • Tag activation and setup • Online/offline option • Local analytics with graph • Android-based app available via Google Play • Compatible with Moto X, Nexus, LGE, Samsung (S5 and up), and Sony Ericsson Xperia Label • Low-cost, self-adhesive • Precise temperature sensor • Digital storage • Flexible battery • NFC-enabled
  • 10. Smart Sensor Label • Small credit card-sized NFC label for temperature data logging • Thin, flexible battery • Temperature: -30 to 50˚C (-22 to 122 ˚F) • Battery life: Up to 8 months • Log capacity: >10,000 (can exceed 30,000) • Configurable logging interval • NXP NHS3100 with embedded accurate temperature sensor • Protected temperature records (target CFR21 part 11) • ISO/IEC 17025 temperature calibration procedure • Programmable software/firmware to support additional use cases, i.e. alarm setup, record only extreme temperatures, etc. Developed by:
  • 11. Trusted IoT & Smart Supply Chain Solutions
  • 12. A Peer-to-Peer Approach to Digital Key Sharing for Vehicle Access & Control Tony Rosati Director of IOT Security, ESCRYPT
  • 13. Agenda • Motivation for Digital Key Sharing • Architecture • Security Model • Security Analysis • Future Work
  • 14. Smartphone Access Control & Key Sharing • No need to manage physical keys • Desire/Need to use the Smartphone • Vehicle sharing • Security alerts • Control/Status
  • 15. Car Sharing Growth • Cars are increasingly too costly to own in the urban environment • Cars sit unused most of the time • Many new services: • BMW Drivenow, • Avis: Zip Car, • Daimler: Car2Go, • Uber, • Lyft
  • 16. Smartphone/Vehicle Integration Vehicle Access • NFC and/or Bluetooth • Security of the smartphone? Enable • Wireless Charging Bluetooth Handoff • Vehicle personalization
  • 17. Consumers Expect a Seamless User Experience
  • 19. ESCRYPT CycurACCESS Architecture • Leverage Public Key Infrastructure (PKI) • Enables efficient digital key sharing • Issue Identity Certificates • Massively scalable • Leverage Mobile Platform Security • Secure Boot • Secure Key Store (hardware level attestation) • Sandboxing • Code Signing Key Sharing Server Owner Smartphone Friend Smartphone Certificate Authority Cellular/ WiFi NFC/BLE TSM
  • 20. Proving Identity • Certificate Authority provides a root of trust • Identity certificates are issued to each user and each vehicle • Vehicle certificates issued in production • User Certificates issued at registration • Entities in the system can now verify each other’s identity securely and efficiently • Verification can be performed offline
  • 21. Establishing Ownership • Each vehicle is assigned a random Ownership Code during manufacture • The owner and the vehicle exchange certificates & a challenge to prove identity • The owner sends the Ownership Code to the vehicle to prove ownership • If valid, vehicle stores new owner certificate for future use • Vehicle generates and forwards signed “proof” to KSS via the owner to confirm new ownership Ownership Code 12345678901234 56789012345678 90121234123 1231245124343 Ownership Code 12345678901234 56789012345678 90121234123 1231245124343 Key Sharing Server (KSS)
  • 22. Gaining Access • To unlock the vehicle, the owner and vehicle begin by exchanging certificates & a challenge to prove identity • The vehicle verifies the identity against stored owner certificate. If so, access is granted Owner
  • 23. Key Sharing • Owner creates and signs Sharing Permission containing Vehicle ID, serial number of friend’s Identity certificate and any restrictions • Owner forwards Sharing Permission to the friend via the KSS or P2P • Note that the KSS does not have to be involved in this process Key Sharing Server Owner Friend
  • 24. Shared Access • To unlock the vehicle, the friend and vehicle begin by exchanging certificates & a challenge to prove identity • The friend sends the Sharing Permission to the vehicle • The vehicle verifies that the following is true of the Permission: • Issued for this vehicle • Issued to the friend • Signed by the owner • No restrictions are violated • If checks pass, access is granted Friend
  • 25. Car Sharing Service • All vehicles are owned by the service • All valid members are issued permissions • The vehicle verifies that the following is true of the Permission: • Issued for this vehicle • Issued to the member • Signed by the service • No restrictions are violated • If checks pass, access is granted • How do we revoke bad actors? Members Key Sharing Server
  • 26. Revoke a Permission • To revoke a Permission, the owner generates a signed revocation request and forwards to the KSS • If valid, the KSS generates a revocation notification and forwards to the friend’s device • Friend’s device deletes the affected Permission Key Sharing Server Owner Friend
  • 27. Dealing with Cheaters • What if the friend is dishonest? • Friend takes their device offline to prevent the Permission from being deleted • How does a car know that a permission is revoked? • What can be done to mitigate this? • Three ideas: • Next time the owner unlocks the vehicle, a list of recently revoked Permissions can be transferred to the vehicle • Permissions could require a periodic authorization from the KSS to remain valid. (Say every 24 hours) • A connected car receives revocations directly
  • 28. Security Analysis/Threat Model • Based on the work of Symeonidis et al. • Main Features • Private keys are never transported & stored in SE • KSS compromise cant be used to gain or share access • Most operations are performed offline which limits the attack surface (ie Denial-of-Service) Key Sharing Server Owner Smartphone Friend Smartphone Certificate Authority Cellular/ WiFi NFC/BLE
  • 29. Relay Attack • Mitigation Strategies • Easy • User based preference • Smartphone screen off • Hard • RF Finger Print • Distance Bounding • Brands and Chaum 1994 – smart cards • Gambs et al 2016 – smartphones • Can detect adversary constantly > 1.5ms relay Vehicle Owner Attacker 1 Attacker 2
  • 30. Conclusion & Future Work • A new approach digital Key Sharing • Using well-known PKI & modern smartphone security • Most operations are done offline to limit the attack surface • Futures • Hardware level Key Attastation • Relay Attack Countermeasures • Thank you • tony.rosati@escrypt.com