How To Protect An Rfid Tag From Attack
|
|
|
- Griffin Craig
- 5 years ago
- Views:
Transcription
1 S e c u r i t y & P r i v a c y A Framework for Assessing RFID System Security and Privacy Risks This framework for evaluating security and privacy risks in RFID systems focuses on key application domains, assessing risk levels for each on the basis of RFID-specific criteria. Paweł Rotter Joint Research Centre of the European Commission Radio Frequency Identification systems use radio waves sent between tags and readers to automatically identify physical objects. 1 Passive tags, which have no battery and simply use the energy of a reader s emitted radio waves, are so small as to be almost invisible: tags that are millimeter are currently on the market. RFID is becoming quite popular in logistics and the supply chain, 2 where vendors use it as a kind of improved bar code. Unlike printed bar codes, for example, RFID tags don t require line-of-sight readings. RFID also enables multiple scanning readers can scan an entire truckload or shopping basket at once, which allows for further automation in many industry processes. Also, bar codes replicate only an ID number, while RFID tags can contain other information, such as product details. When combined with sensors, RFID tags can store the history of storing conditions, mechanical shocks, and so on. Increasingly, developers are commercializing RFID technology beyond logistics and the supply chain, offering applications for various domains, including medicine and agriculture. 3,4 They re also using RFID in applications that can identify people (e-passports) and in access-control systems. Clearly, RFID is a powerful technology with numerous application possibilities. It s also a technology that raises serious privacy and security risks. Several RFID features make it particularly vulnerable among information systems, including the wireless transmission between the tag and reader; the tag s low computational power, which is often insufficient for strong security measures; and the tag s small size, which means that people can carry one without their consent or even knowledge. Here, I offer an overview of the main RFID privacy and security threats and countermeasures, focusing on those that are exclusive to this technology. I then propose a framework for evaluating domain risks using three criteria: the system s deployment range, the link between the RFID tag and identity-related data, and the domain s security demands. Threats to RFID systems Like all information systems, RFID-based 70 PERVASIVE computing Published by the IEEE CS n /08/$ IEEE
2 Figure 1. Relay-attack scheme. Attackers establish a communications channel between the reader and tag and thereby authenticate themselves in the target system. systems are subject to generic attacks that threaten system security and user privacy. However, there are also many attacks that specifically target RFID system technologies. Eavesdropping In eavesdropping, hackers secretly monitor data sent from an RFID tag to a reader, or vice versa, via the air interface (the communication channel between the reader and tag). Because eavesdropping is passive that is, the attacker doesn t emit any signal it s highly difficult to detect. The most common countermeasures are to encrypt the data (so eavesdropping hackers can t understand the signal) and to use a metal screen to shield the tag and reader during information exchange (such as at border checkpoints). It s also important to limit the distance between the tag and reader by using the standard with the smallest communication range sufficient for a given application. However, developers must also bear in mind that, using a nonstandard reader, hackers can extend a standard communication range several times. 5 Relay attacks As figure 1 shows, in a relay attack, attackers create a connection between a legitimate reader and a victim s legitimate tag. 5 From the RFID system s viewpoint, the communication looks as if the legitimate tag and the reader are close to each other, when in fact they re communicating through the (usually wireless) communication channel that the attackers have established. Attackers can thereby authenticate themselves in access-control or payment systems. Researchers have proven that it s possible to successfully execute a relay attack against an ISO-14443A-compliant RFID system. 6 Fake RFID tag Because attackers only transmit information without needing to understand it the authentication protocol (such as challenge-response) doesn t protect against this kind of attack. Developers can counter this threat and the following four by using short-range tags and by shielding the tags (such as keeping them in bags made of aluminum foil) while not in use. There s also a specific relay-attack countermeasure, the distance bounding protocol, 7 which uses response time to estimate the distance between the reader and tag. Any distance Legitimate devices Attacker s devices Data transmission Fake RFID reader Unauthorized tag reading Attackers can use a fake reader to read tag information. They can extend a fake reader s range by several times that of the standard communication distance. 5,8 Moreover, it s relatively cheap to build an extended range reader. A specific countermeasure against unauthorized tag reading is reader authentication. Another is initialization of transmission after the user activates the tag (by pressing a button, for example), so the possibility of unauthorized reading is limited to moments when the user demands a legitimate communication. Developers can also reduce risk by moving sensitive information to a protected database in the system s back end, as in VeriMed (see a medical information system. Developers can address concerns about the unauthorized reading of a shopping bag s RFID-tagged contents using the kill command, which permanently disables the tag (and is obligatory in standard EPCGlobal Class 2). Researchers have also proposed a tag designed to let users physically destroy it. 9 Tag cloning In tag cloning, attackers make a duplicate RFID tag, which might either be quite similar in size or much larger than the original but have the same functionality. Attackers can use duplicates to access a restricted area, abuse private data, or make an electronic transaction on the victim s behalf. Tag authentication prevents cloning; if developers use a challenge-response protocol, the information that attackers can obtain through the air interface (such as by eavesdropping) is insufficient to duplicate the tag. Also, developers can apply appropriate measures at the circuit manufacturing stage to protect tags from duplication by reverse engineering. People tracking In people tracking, attackers follow tag carriers movements using various techniques, including placing fake readers in doors or deploying eavesdropping devices near legitimate readers. Several countermeasures that I ve already discussed also work with track- APRIL JUNE 2008 PERVASIVE computing 71
3 Security & Privacy TABLE 1 Threats and their relationship to vulnerabilities in RFID systems components. Tag Air interface Reader Network Back end Eavesdropping Relay attack Unauthorized tag reading Tag cloning People tracking Replay attack Tag content changes Malware RFID system breakdown Tag destruction Blocking Jamming Back-end attacks ing, including using low-range tags or shielding tags, authenticating readers, and disabling tags when they re not in use. In the future, however, people will carry many RFID tags, so it might be highly useful to develop a personal device to control access to them, possibly integrated into mobile phones or PDAs. 10 Developers can implement other countermeasures at the tag-design stage, including pseudonyms (changing identifiers) or tag-reader distance estimators based on the signal-to-noise ratio. 11 Replay attacks In replay attacks, attackers abuse authorized tag carriers identities by repeating their authentication sequences. To do this, attackers might use a clone of a legitimate tag or resend the eavesdropped signal from a PC equipped with an appropriate card and antenna. To perform replay attacks, attackers must obtain information sent by the tag during normal communication. Here, countering eavesdropping and unauthorized tag reading offers a first line of defense. A specific replayattack countermeasure is to authenticate tags using, for example, the challengeresponse protocol. In this case, the tag calculates its authentication code based on the challenge the reader sends. In a well-designed protocol, attackers can t deduce the key required to calculate a response from information exchanged through the air interface. Tag content changes If a tag is writeable, attackers can change its content, distorting item attributes or leading the access-control system to falsely reject an authorized person. Furthermore, they can insert malware such as modified tag data that the reader interprets as a command into writeable tags using, for example, SQL injection. 12 In some writeable tags, developers can protect memory content by temporarily or permanently disabling writing capability (using, for example, the standard EPCGlobal Class 2 Gen 2 tag s lock and permalock functions). Also, developers can implement the readers so as to prevent them from interpreting a tag s data as a command. Physical tag destruction The easiest and cheapest way to disrupt RFID systems is to physically destroy the tags heat them in a microwave, hit them with a hammer, and so on. This issue is especially relevant for applications that use RFID tags not just for identification purposes, but also to protect items against theft. Also, people concerned with privacy might destroy the RFID tags in their e-passports, which are still valid even if the RFID tag doesn t work. 13 Blocking and jamming Attackers perform a blocking attack using a blocker tag, which simulates the existence of numerous tags and thus causes a denial of service as the reader endlessly interrogates the nonexistent tags. However, blocking can be useful as originally proposed, it serves to protect consumer privacy. 14 In jamming, attackers paralyze RFID system communications by generating a radio noise at the same frequency as that of the system. Blocker tags and jamming devices are easy to detect and localize, and developers can even implement appropriate warning functionalities into the system. Overall threat analysis Table 1 summarizes the threats and indicates the system component involved in the attack. As the table shows, few threats are related to the back end or the network; such threats are more typical for information systems in general. (For an 72 PERVASIVE computing
4 Table 2 RFID system threats and their potential consequences. Consequence Threat Relay attack* Tag cloning* Tracking* Replay attack* Tag content changes RFID system breakdown Back-end attacks Malware* Unauthorized access to secret/private data Spoofing access-control systems Material damages Theft of goods Eavesdropping Relay attack Unauthorized tag reading Tag cloning Tracking Replay attack Tag content changes RFID system breakdown Malware Blocking Physical tag destruction Jamming Back-end attacks An indicates direct relationship between the threat and its consequence; indicates an indirect relationship. An * indicates consequences that are also threats. overview of risks and countermeasures for back-end attacks, see the overview by Susan Hansche and colleagues. 15 ) Most threats exploit vulnerabilities of the air interface and the tag and are therefore specific to RFID systems. Table 2 presents the threats potential consequences. Most of the consequences (those marked with an asterisk) also occur as threats and might negatively impact the system even if they re not perceived as a problem. For example, eavesdropping might enable tag cloning, which could then result in a replay attack; the final consequence could be unauthorized access to a restricted area. As these relations imply, a single system vulnerability can threaten security and privacy in areas that are only indirectly related. Framework for evaluating risks Figure 2 shows the privacy and security taxonomy of RFID applications. I evaluate risks on the basis of three criteria: system deployment range (horizontal axis in figure 2), the link between the tag and identity-related data (vertical axis), and the domain s security demands (box color). The most critical applications are the red boxes in the figure s top-right area. System deployment range Here, I consider three basic types of RFID systems: those with local, restricted operations; those distributed within a single organization; and those distributed across different organizations. In locally operated systems such as those used in some manufacturing processes or local access-control applications the readers and back-end system use a local network to exchange information in a restricted area. Rather than exchanging information over a network, it s also possible to connect an RFID reader to a single computer that contains the whole back end (database and software). Although this solution has a limited scope, it might be sufficient, for example, in some manufacturingprocess stages, such as element recognition in automatic assembly. The second system type is distributed in space but controlled by a single organization or by a network of cooperating institutions. Typical examples include public transportation, administrative processes, some industry applications, and some access control systems. It s more difficult to secure these systems than locally operated ones because data is transmitted between physically separated sites and thus is more vulnerable. The third type is systems that operate over large physical areas and across organizations (and often, platforms). Here, I distinguish between two different system types depending on where the information is stored: in a central database or on RFID chips. If a system uses a central database, it s accessible through a global network. This is the case for applications like Object Name Service, 16 livestock APRIL JUNE 2008 PERVASIVE computing 73
5 Security & Privacy Type of link between an RFID tag and identity-related data Identifying a good or service Identifying a person Systems based on RFID implants Fixed link between tag and identity Tag can be temporarily linked to identity Tag-identity link not possible Implant-based systems for access control Tokens for access control Prisoners tracking Public transport Administrative process Most industry applications Implant-based medical information systems (such as VeriMed) e-passports, e-ids Payment systems Location-based service, near-field communication Car-to-car communication Medical supplies Item-level tagging and Object Name Service Stolen goods tracking Livestock tracking Demand for security High System operating locally within a restricted area System distributed in space, within a single organization System operating across different organizations Medium Low Closed systems Range of system deployment Open systems Figure 2. Privacy and security risk assessment taxonomy. E-passports and implant-based access-control and medical information systems are particularly vulnerable application areas. tracking, and medical care systems such as VeriMed. This category also includes many emerging applications, such as location-based services and stolen-goods tracking systems. An example of systems that operate without a central database and keep data on tokens is e-passports, which store the owner s identity data on memory chips. From a privacy and security viewpoint, avoiding a central database might seem like an advantage; attackers can crack it and eavesdrop on transferred data. On the other hand, for token-based solutions, attackers might retrieve the token s data through the air interface (by eavesdropping a fake reader access) or through reverse engineering. Links between the tag and identity-related data Privacy risks exist only in systems that establish a link between the RFID tag and a specific person s identity. In this category, I consider four classes of RFID systems. In the first class, tags contain information about physical objects that are unrelated to people and 74 PERVASIVE computing
6 can t be linked to them. Examples here include most industrial applications and livestock tracking systems. In the second class, a tag might be temporarily linked to an identity. Examples include item-level tagging in retail (tagged goods purchased in a shop might be used to track people), administrative processes (document tagging in an administrative circuit), medical supplies (drug labeling), and stolen-goods tracking. Applications using anonymous tokens such as single-use tickets in public transportation also belong to this group. From a privacy viewpoint, an anonymous token is no different than any other item: it has no direct link to the carrier s personal identification data. However, if a person carries a whole set of anonymous tags, it can create a signature that if periodically updated can be permanently used to identify the person, despite the temporary character of the link between a single tag and its owner. Systems in the third class establish a fixed link between a tag and the owner s identity. Such tags are built into personal tokens, which are directly linked to personal data. Examples here include e- passports and payment systems (such as SpeedPass 1 ). Many future applications will also likely fall into this category, including credit card systems, locationbased services, mobile phones equipped with near-field communication, and smartcards for access control. In the fourth class, RFID implants, RFID tags are inserted directly into the human body. Many people have already voluntarily had RFID tags implanted, including for healthcare purposes (as in VeriMed, which offers instant patient identification and medical-records ac- cess), for controlling company premises (the VeriGuard system), and even for fun (as in Barcelona s Baja Beach Club). Such systems have a high privacy risk, especially because most existing implants have weak (if any) security measures. 17 Demand for security Security demands depend mostly on two factors: The size of the potential damage, which might include loss of money, loss of customers, or disclosure of privacy-sensitive information. The attackers motivation level that is, how much attackers stand to gain if they re successful. Because these factors often correlate, I aggregate them into a single criterion. However, the factors aren t always linked: in medical information systems, for example, incorrect treatment can cause serious damage, but potential attackers have far less incentive here than they do with payment systems or e-passports. Vulnerable application domains Given these risk evaluations, I ve identified three application areas that are particularly vulnerable to privacy and security threats: implant-based medical information systems, implant-based access-control systems, and e-passports (see figure 2). Implant-based medical information systems VeriMed, which is apparently enjoying rapid adoption by many hospitals, is the first commercial system of this type. VeriMed uses VeriChip RFID implants ( and gives each patient a unique ID number. When the reader is close to patients, it detects their ID numbers and lets phy- sicians access patients medical records through a password-protected website. The advantage of such systems is that medical professionals can easily and immediately retrieve vital information from practically everywhere, even when patients are unconscious. This is a critical system type for several reasons: Implants are permanently and physically linked to people, making them sensitive from a privacy perspective. VeriMed and all future systems of this type must operate globally; anyone interested in cracking such a system can simply buy a tag and analyze it. People have already done this with VeriChip implants and offer detailed information on the Web about how to crack them ( Because it s globally accessible, the database which contains sensitive data is more vulnerable to unauthorized access. Health information is sensitive. Leaking such information to third parties could damage the targeted person s reputation. Malicious modification of health information could lead to incorrect medical treatment and, in the worst case, to the person s death. Developers can increase implantbased medical information systems security by encrypting the information an implanted tag transmits and by authenticating the reader. Furthermore, developers can secure the system s back end through strong authentication of the people with database access. For example, to do this, they could use two-way authentication: a password and a token that has a digital signature. RFID implants also raise concerns beyond those related to privacy and security. Potential developers must consider such factors as low social acceptance, ethical issues, and possible APRIL JUNE 2008 PERVASIVE computing 75
7 Security & Privacy adverse medical effects, which have yet to be well researched. 18 Implant-based access-control systems An RFID tag inserted into a human body can offer authorized access to restricted areas (home or workplace, for example) or devices (a computer or a car). VeriGuard ( com/content/solutions/accesscontrol), is the first commercial system of this type, and, like the VeriMed system, is based on VeriChip implants. Access-control using RFID implants entails a special risk for three reasons: As with medical implants, the system is privacy sensitive because the implant is permanently and physically linked to a person. It offers potentially high attacker motivation. Depending on the application, damages could be quite large in a successful attack. These implant-based access-control systems are still in the early development stages. Currently, VeriGuard s security measures are weak for two reasons: authentication is based on an ID number that the implant sends in unencrypted form, and the system s VeriChip implant is easy to clone. 17 Some individuals have had RFID tags implanted that were originally manufactured for industry or supply chain purposes and include cryptosecurity features. 19 Nevertheless, implants shouldn t be used for applications with high security demands even if they have built-in strong authentication algorithms because there s a risk of coercive attack and potential damage to the victim s body. 17 Even without strong security features, developers can use implants as an element of access-control systems in a safe way, increasing the overall system s se- curity and efficiency. Combined in multimodal systems, they protect against both password spying and token stealing. In systems with password- and token-based authentication, implants also offer an additional modality that can prevent people from giving unauthorized privileges to colleagues. In a secure environment, organizations could use implants for continuous presence detection, immediately blocking access (to a control board or computer, for example) when the authorized person walks away. The authorized person could then re-establish access through other, more secure authentication methods. In any case, when organizations require strong security, they should use implants only as an additional authentication technique. E-passports Many countries including the US and all European Union members recently introduced e-passports containing RFID chips. When interrogated by the reader, these chips transmit personal and biometric data; in the latter case, the data is only a digital photo of the owner but in the near future, countries are planning to use fingerprints and possibly iris data. Personal and biometric data are particularly sensitive. Also, attackers might be highly motivated to copy e-passports or use their data for identity theft. The consequences of an attack could be serious, including personal and biometric data theft, tracking of the e-passport s owner, illegal border crossings or even detonating a bomb designed for a specific country of origin or for a specific individual, based on information emitted by the chip in his or her passport. 20 E-passports standard security mechanisms (Basic Access Control) use 128- bit key; although the US National Institute of Standards and Technology recommends 112 bit as safe till 2015, the e-passport key is calculated based on information that s accessible in the machine-readable zone. This information, even if it s unknown to attackers, has limited entropy. Given the interrelationship of some data, we can decrease total key entropy to a mere 41 bits, which is definitely insufficient (researchers have calculated an example for the Dutch passport). 21 Moreover, attackers can track the e-passport s owner even without knowing the key using the information exchanged between the RFID tag and reader before reader authentication. Attackers could do this, for example, using tag identifiers that are a part of the anticollision protocol. 21 Developers can increase RFID passport security using asymmetric cryptography (Extended Access Control). Although some countries use this, it s not mandatory according to International Civil Aviation Organization standards. A simple yet efficient protection is to use a cover made of antiskimming material. As researchers have recently stressed, 22 we need an integrated approach to e- passport security at the international level. Making security measures such as Extended Access Control obligatory and defining detailed standards for security solutions would make passports much safer, regardless of the issuing country. Of the three application areas I consider particularly sensitive, two are based on RFID implants, which have considerable potential. However, the implant approach also raises several technical, medical, and social concerns that must be solved if this approach is to be more widely adopted. 18 The third application area epassports is part of an ongoing public consultation in the European Union (see 76 PERVASIVE computing
8 the Authors The focus of this discussion is RFID application areas; however, a specific system s vulnerability depends on its implementation and the applied countermeasures. Developers can build an RFID system with a satisfactory security level even in a high-risk application area. To do so, however, they must pay special attention to the implementation of proportional security measures. Also, as we move forward, we must reenforce our efforts to achieve effective RFID security and privacy technologies with efforts aimed at creating user trust and awareness. 3 Even a secure system will fail if users think it lacks sufficient security and privacy protections. Acknowledgments Thanks to Ioannis Maghiros from the European Commission, DG Joint Research Centre IPTS for many helpful comments and suggestions, and to Patricia Farrer from DG JRC IPTS for help in preparing this article. The views expressed in this article are those of the author, and in no way represent the European Commission s official position. References 1. S. Garfinkel and B. Rosenberg, RFID: Applications, Security, and Privacy, Addison-Wesley, I. Bose and R. Pal, Auto-ID: Managing Anything, Anywhere, Anytime in the Supply Chain, Comm. ACM, vol. 48, no. 8, 2005, pp I. Maghiros, P. Rotter, and M. Van Lieshout, eds., RFID Technologies: Emerging Issues, Challenges, and Policy Options, tech. report EN, European Commission Joint Research Centre s Inst. for Prospective Technological Studies, B. Nath, F. Reynolds, and R. Want, RFID Technology and Applications, IEEE Pervasive Computing, vol. 5, no. 1, 2006, pp Z. Kfir and A. Wool, Picking Virtual Paweł Rotter is a researcher at the Institute for Prospective Technological Studies (IPTS), Joint Research Centre of the European Commission in Seville. He is currently on leave from the Department of Automatics at AGH-University of Science and Technology, Krakow, where he is an assistant professor. His current research projects focus on privacy and security aspects of RFID and biometrics. He has a PhD in computer science from AGH-University of Science and Technology. Contact him at [email protected]. Pockets Using Relay Attacks On Contactless Smartcard Systems, Proc. 1st Int l Conf. Security and Privacy for Emerging Areas in Comm. Networks (Securecomm 05), IEEE CS Press, 2005, pp G. Hancke, A Practical Relay Attack On ISO Proximity Cards, Univ. Cambridge Computer Lab, 2005, www. cl.cam.ac.uk/ ~gh275/relay.pdf. 7. G. Hancke and M. Kuhn, An RFID Distance Bounding Protocol, Proc. 1st Int l Conf. Security and Privacy for Emerging Areas in Comm. Networks (Securecomm 05), IEEE CS Press, 2005, pp I. Kirschenbaum and A. Wool, How to Build a Low-Cost, Extended-Range RFID Skimmer, Int l Assoc. Cryptology Research, 2006, org/2006/ G. Karjoth and P. Moskowitz, Disabling RFID Tags with Visible Confirmation: Clipped Tags Are Silenced, Proc. Workshop on Privacy in the Electronic Society, ACM Press, 2005, pp M. Rieback, B. Crispo, and A. Tanenbaum, RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management, Proc. Australasian Conf. Information Security and Privacy (Acisp 05), LNCS 3574, Springer, 2005, pp S. Garfinkel, A. Juels, and R. Pappu, RFID Privacy: An Overview of Problems and Proposed Solutions, IEEE Security and Privacy, vol. 3, no. 3, 2005, pp M. Rieback, B. Crispo, and A. Tanenbaum, Is Your Cat Infected With A Computer Virus? Proc. Int l Conf. Pervasive Computing and Comm. (Percom 06), IEEE CS Press, 2006, pp J. Wortham How To: Disable Your Passport s RFID Chip, Wired, vol. 15, no. 1, 2007, archive/15.01/start.html?pg= A. Juels, R. Rivest, and M. Szydlo, The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy, Proc. Int l Conf. on Computer and Comm. Security, ACM Press, 2003, pp S. Hansche, J. Berti, and C. Hare, Official (ISC)2 Guide to the CISSP Exam, Auerbach Publications, B. Fabian, O. Günther, and S. Spiekermann, Security Analysis of the Object Name Service, Proc. Workshop Security, Privacy, and Trust in Pervasive and Ubiquitous Comp., 2005, epfl.ch/~gavoine/download/papers/fabiangs-2005-sptpuc.pdf. 17. J. Halamka et al., The Security Implications of VeriChip Cloning, J. American Medical Informatics Assoc., vol. 13, no. 6, 2006, pp P. Rotter, B. Daskala, and R. Compañó, RFID Implants: Opportunities and Challenges in the Identification and Authentication of People, forthcoming, IEEE Technology and Society, A. Graasfata, RFID Toys, Wiley, A. Juels, D. Molnar, and D. Wagner, Security and Privacy Issues in E-Passports, Proc. 1st Int l Conf. Security and Privacy for Emerging Areas in Comm. Networks (Securecomm 05), IEEE CS Press, 2005, pp J.H. Hoepman et al., Crossing Borders: Security and Privacy Issues of the European E-Passport, Advances in Information and Computer Security, LNCS 4266, Springer, 2006, pp M. Snijder, Security and Privacy in Large- Scale Biometric Systems, report, European Commission Joint Research Centre s Inst. for Prospective Technological Studies, 2007, SecurityPrivacyFinalReport.pdf. For more information on this or any other computing topic, please visit our Digital Library at APRIL JUNE 2008 PERVASIVE computing 77
Security and Privacy in RFID Applications
13 Security and Privacy in RFID Applications Paweł Rotter Joint Research Centre of the European Commission, Institute for Prospective Technological Studies Seville, Spain Currently at: AGH-University of
Various Attacks and their Countermeasure on all Layers of RFID System
Various Attacks and their Countermeasure on all Layers of RFID System Gursewak Singh, Rajveer Kaur, Himanshu Sharma Abstract RFID (radio frequency identification) system is one of the most widely used
RFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam [email protected] 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
An Overview of Approaches to Privacy Protection in RFID
An Overview of Approaches to Privacy Protection in RFID Jimmy Kjällman Helsinki University of Technology [email protected] Abstract Radio Frequency Identification (RFID) is a common term for technologies
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
How To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
RFID Security and Privacy: Threats and Countermeasures
RFID Security and Privacy: Threats and Countermeasures Marco Spruit Wouter Wester Technical Report UU-CS- 2013-001 January 2013 Department of Information and Computing Sciences Utrecht University, Utrecht,
RF ID Security and Privacy
RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from
PAP: A Privacy and Authentication Protocol for Passive RFID Tags
PAP: A Privacy and Authentication Protocol for Passive RFID s Alex X. Liu LeRoy A. Bailey Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824-1266, U.S.A. {alexliu,
Data Protection Technical Guidance Radio Frequency Identification
Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
Security Issues in RFID. Kai Wang Research Institute of Information Technology, Tsinghua University, Beijing, China [email protected].
Security Issues in RFID Kai Wang Research Institute of Information Technology, Tsinghua University, Beijing, China [email protected] Abstract RFID (Radio Frequency IDentification) are one
An Overview of RFID Security and Privacy threats
An Overview of RFID Security and Privacy threats Maxim Kharlamov [email protected] The University of Auckland October 2007 Abstract Radio Frequency Identification (RFID) technology is quickly deploying
A Research on Issues Related to RFID Security and Privacy
A Research on Issues Related to RFID Security and Privacy Jongki Kim1, Chao Yang2, Jinhwan Jeon3 1 Division of Business Administration, College of Business, Pusan National University 30, GeumJeong-Gu,
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
A Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 [email protected] and [email protected] 1 Department of Algebra, Charles University
Tackling Security and Privacy Issues in Radio Frequency Identification Devices
Tackling Security and Privacy Issues in Radio Frequency Identification Devices Dirk Henrici and Paul Müller University of Kaiserslautern, Department of Computer Science, PO Box 3049 67653 Kaiserslautern,
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda
Security Issues in RFID systems By Nikhil Nemade Krishna C Konda Agenda Introduction to an RFID System Possible Application Areas Need for Security Vulnerabilities of an RFID system Security Measures currently
Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
Security and privacy in RFID
Security and privacy in RFID Jihoon Cho ISG PhD Student Seminar 8 November 2007 Outline 1 RFID Primer 2 Passive RFID tags 3 Issues on Security and Privacy 4 Basic Tags 5 Symmetric-key Tags 6 Conclusion
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
50 ways to break RFID privacy
50 ways to break RFID privacy Ton van Deursen 1 University of Luxembourg [email protected] 1 Financial support received from the Fonds National de la Recherche (Luxembourg). RFID privacy 1 / 40 Outline
Security in RFID Networks and Protocols
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 425-432 International Research Publications House http://www. irphouse.com /ijict.htm Security
Security Challenges for User-Oriented RFID Applications within the Internet of Things
Security Challenges for User-Oriented RFID Applications within the Internet of Things G.P. HANCKE, K. MARKANTONAKIS and K.E. MAYES ISG Smart Card Centre Royal Holloway, University of London UNITED KINGDOM
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Feature. Security and Privacy Trade-offs in RFID Use. Operational Zone RFID Tag. RFID Reader
Feature Security and Privacy Trade-offs in RFID Use S. Srinivasan is a professor of computer information systems at the University of Louisville in Kentucky, USA. He can be reached at [email protected].
Back-end Server Reader Tag
A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags Shucheng Yu, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, MA 01609 {yscheng, wjlou}@wpi.edu
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
On the Security of RFID
On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com
Privacy Implications of RFID Tags by Paul Stamatiou. CS4001, Georgia Institute of Technology November 8 th, 2007
Privacy Implications of RFID Tags by Paul Stamatiou CS4001, Georgia Institute of Technology November 8 th, 2007 Radio Frequency Identification (RFID) is a maturing wireless technology with widespread uses,
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
Small Tech, Big Issues
Small Tech, Big Issues How It Works Advantages of RFID History of the RFID Proposed Uses Identification Medical Records Immigration Security Authentication Ethical Issues Purchase tracking Lack of encryption
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control
ABSTRACT. Keyword: - RFID, unauthorized transaction, security. Vol-1 Issue-3 2015 1. INTRODUCTION 2. RFID SYSTEM. 1237 www.ijariie.
Survey on Enhancing Security for RFID Smart Cards Shilpa S. Badhiye 1 Prof.Rupali S. Khule 2 1 student, Electronics and telecommunication Department, MCOERC, Maharashtra, India 2 Professor, Electronics
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500
INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
RFID Security and Privacy. Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005
RFID Security and Privacy Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005 1 RFID: The Industry s Vision. Distribution Center Consumer Docks
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
LibRFID: Automation Software for Library Management System Using RFID Technology
LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi,
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of 12.5.2009
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 12.5.2009 C(2009) 3200 final COMMISSION RECOMMENDATION of 12.5.2009 on the implementation of privacy and data protection principles in applications supported
RFID Guardian Back-end Security Protocol
Master Thesis RFID Guardian Back-end Security Protocol Author: Hongliang Wang First Reader: Bruno Crispo Second Reader: Melanie Reiback Department of Computer Science Vrije Universiteit, Amsterdam The
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols Ehsan Vahedi, Rabab K. Ward and Ian F. Blake Department of Electrical and Computer Engineering The University of British
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Network Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 2 Collaboration with Frank Akujobi
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran
How To Secure Cloud Computing
Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Biometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
Karsten Nohl University of Virginia. Henryk Plötz HU Berlin
Karsten Nohl University of Virginia Henryk Plötz HU Berlin Radio Frequency IDentification Tiny computer chips Passively Powered Karsten Nohl, Henryk Plötz - RFID Security 2 Constant monitoring is already
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
How To Protect Your Information From Being Hacked By A Hacker
DOL New Hire Training: Computer Security and Privacy Table of Contents Introduction Lesson One: Computer Security Basics Lesson Two: Protecting Personally Identifiable Information (PII) Lesson Three: Appropriate
CHAPTER 10: COMPUTER SECURITY AND RISKS
CHAPTER 10: COMPUTER SECURITY AND RISKS Multiple Choice: 1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer:
DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM
Part-I: Natural and Applied Sciences ISSN-L: 2223-9553, ISSN: 2223-9944 DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM Safaa A. Mahdi Technical Institute, Babylon, IRAQ. [email protected]
WHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
RFID in a nutshell. Colin Jervis, Director, Kinetic Consulting Ltd
Colin Jervis, Director, Kinetic Consulting Ltd Enthusiasts in healthcare fields suggest that one day a tiny RFID (or radio-frequency identification) tag implanted under your skin could transmit your NHS
Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:
Network Security Chapter 12 Learning Objectives After reading this chapter, you should be able to: Recognize the basic forms of system attacks Recognize the concepts underlying physical protection measures
