Secure Contactless Sphere Smart RFID-Technologies for a Connected World. Werner Haas, Herwig Zeiner & SeCoS Konsortium



Similar documents
IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!

NFC for embedded applications. Your critical link for the Internet of Things

Rolf de Vegt, July 8, IEEE802.11ah Benefits and Use Cases

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID Penetration Tests when the truth is stranger than fiction

RFID BASED VEHICLE TRACKING SYSTEM

Using RFID Techniques for a Universal Identification Device

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO

Break out session Materials / Integration

Hvor går RFID forskning og utvikling?

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

APPLIED AND INTEGRATED SECURITY

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Chip Card & Security ICs Mifare NRG SLE 66R35

Trends in der Forschung für kontaktlose Anwendungen

Contending With Multiple Wireless Technologies In The Connected Home

Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag

TURPAK Vehicle ID Solution Solution Overview for Oil Companies

REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN

Towards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna

DesignWare IP for IoT SoC Designs

Developments in 900 MHz wireless connectivity systems. Guido Dolmans Holst Centre / Imec-NL

Marko Hännikäinen Tampere University of Technology IoT week CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS

Implementation of Wireless Gateway for Smart Home

DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES

ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I ERDİNÇ YILMAZ

Industrial IOT Gateway Family Datasheet

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department

OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications

Qualcomm Atheros AR4100: Wi-Fi Solution for the Internet of Things

NACCU Migrating to Contactless:

The Internet of Things: Opportunities & Challenges

Security in Near Field Communication (NFC)

What is a Smart Card?

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

Current and Future Trends in Hybrid Cellular and Sensor Networks

Atmel Innovative Silicon RFID IDIC Solutions

The Research and Application of College Student Attendance System based on RFID Technology

Intelligent Home Automation and Security System

An Introductory and Elementary Study on RFID & Its Applications

Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?

The 5G Infrastructure Public-Private Partnership

11 Internet of Things (IoT) Protocols You Need to Know About

1. NON CONTACT DIGITAL TACHOMETER USING AVR MICROCONTROLLER 2. CELSIUS SCALE THERMOMETER USING Atmega BLACK BOX SECURITY SYSTEM FOR CAR USING

The Internet of Things (IoT)

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

Secure Semi-Passive RFID Tags Prototype and Analysis

Security & Chip Card ICs SLE 44R35S / Mifare

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson

3G Wireless-N Smart Energy Gateway

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}

Wi-Fi, Bluetooth, and the Internet of Things

Wireless Mobile Workforce

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

Home Automation and Cybercrime

TT-RFID platform - Introduction

Tnet WIRELESS MESH SENSOR NETWORKS

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

RF Attendance System Framework for Faculties of Higher Education

WISE-4000 Series. WISE IoT Wireless I/O Modules

advant advanced contactless smart card system

We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in

Internet of Things: TI's Wireless Connectivity Solutions

Challenges of the Internet of Things for Sensor and Actuator Applications

How To Understand The Power Of An Freddi Tag (Rfid) System

Exercise 1: Set up the Environment

Side Channel Analysis and Embedded Systems Impact and Countermeasures

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China

Gemalto Mifare 1K Datasheet

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

Security and Privacy Issues of Wireless Technologies

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:

Short-range Low Power Wireless Devices and Internet of Things (IoT)

Presented by: Robert Buczkiewicz, Director, Hardware Development, LS Research Sai Yelisetty, Director Sales & Marketing, DSP Group Arik Gur, Product

Introduction to Silicon Labs. November 2015

NFC. Technical Overview. Release r05

Challenges of Requirements Modelling in the Product Development Process

Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center

IoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China

Security in RFID Networks and Protocols

RF Energy Harvesting and Wireless Power for Low-Power Applications

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS

Evolving Bar Codes. Y398 Internship. William Holmes

A Semi-Passive UHF RFID Tag Chip Applied for Electronic Vehicle Identification (EVI)

Intelligent Fleet Management System Using Active RFID

Transcription:

Secure Contactless Sphere Smart RFID-Technologies for a Connected World Werner Haas, Herwig Zeiner & SeCoS Konsortium Graz, am 7. Oktober 2013

Motivation Das Web of Things Vernetzung von Menschen mit diesen physischen Objekten Interaktion mit den physischen Objekten / der Objekte untereinander Sicherheit gewährleisten Schutz der Privatsphäre Sichere Gesamtlösung Elektronik weiterentwickeln + + Höhere Reichweite Schnellere Übertragung 4

Projektaufbau & Ergebnisse Future Applications Demonstrations Community Building P1: Web of Things Application Platform P3: Contactless Transmission Technologies 1. Social Connected City 2. Product Software Updates in User Self Service 3. Industrial Lean Maintenance 4. Theft Protected Object 5. Fraud Protected Product P2: Integrated Secure Technologies

Access Without Permission A Practical RFID Relay Attack Proximity >50m via Bluetooth Roman Silberschneider, Thomas Korak, and Michael Hutter, Austrochip 2013

Mobile Security Research Results Mobile devices as RFID reader platforms Security/privacy vulnerabilities of reader platform might impact the security/privacy of IoT applications E.g. (data dependent) information leakage during computations Execution times Power consumptions EM emanations 9

Timing Attacks (1) Exploit execution times of secret computations to recover secret data (e.g., cryptographic key) Why does the execution time vary? Conditional execution of instructions Retrieving data from different memory locations Cache access Data retrieval almost immediately Main-memory access Data retrieval takes more time 10

Timing Attacks (2) Approach Gather measurement samples of multiple AES encryptions Statistical analysis of execution times recover (parts) of the secret key Results 3 mobile devices (tablets and smartphones) Reduced 128-bit AES key to ~58-bit AES key potential security vulnerability For further information see list of publications at http://www.comet-secos.at 11

MMID mm-wave RFID MMID system simulations: TX FWD Base Station Channel Transponder RX BWD Channel measurements: Using prototype antenna fc: 63 GHz, BW: 8.5 GHz Half power beam width: 40 Gain: 10 db Philipp Franz Freidl, Michael Gadringer, IHF 12

Smart City RFID in Public Transport Fare collection Operating company Data on traffic streams Basis of optimizing bus/train schedules Active check-in/ active check-out Passive checkin/check-out High cost transponders User acceptance? Solution: Active check-in/passive check-out 13

Status Dual RF Interface AFE (active check-in/passive check-out demonstrator) Elaboration of preliminary specifications based on expected application conditions Extension of investigation towards semi-passive operating mode Adoption of existing IP-blocks for HF mode operation Design UHF power conversion unit (PCU) in an ultra deep submicron technology High efficiency charge pump along with limiter circuits and ESD structures Design in an advanced pre-layout state Design UHF demodulator with optional high-sensitivity mode for semi-passive operation Square-law detector, baseband amplifier and low-power wakeup Early concept phase Expected tape-out of test-chip featuring UHF PCU and first versions of building blocks of the UHF demodulator: Q2, 2014 14

Wireless Sensor Node with NFC support

Wireless Sensor Network Nodes for Home Automation WLAN Router as WSN Gateway WLAN NFC home charging stations W-Mbus P = 300W E=1200kWh Light:On/Off Lock and unlock your home charging station Monitor the power consumption/ power metering of appliances Control appliances

FiND-iT RFID Starter Kit RFID Journal s FiNDiT Kit provides a complete UHF RFID solution for small businesses and offices, home offices and consumers to identify, confirm and track assets or items right out of the box.

Theft Protected Object 1. Tags anbringen 2. Schutzzone betreten 3. Schutzzone verlassen 4. Diebstahlserkennung 18

Trends Infineon secures egovernment services (eid for South Africa) Complete Identity Protection with SmartMX NXP Technology NXP has delivered more than two billion secure SmartMX microcontrollers for Smart Cards and the National Identity Card New Features for RFID Sensors (AMS markets a new generation of RFID sensors) Smart Webzine: Newsletter #210-10/04/2013 - www.smart-webzine.com

Trends Massive Growth of Mobile Payments in Canada New EU rules on personal identity New Directive on Payment Services (PSD-2) A wind of madness blows on ICT Panic seizes our leaders who suddenly are discovering the weakness of our communication systems. Smart Webzine: Newsletter #210-10/04/2013 - www.smart-webzine.com

Fördergeber Das K-Projekt SeCoS wird im Rahmen von COMET Competence Centers for Excellent Technologies durch BMVIT, BMWFJ und die Steirische Wirtschaftsförderungsgesellschaft mbh (SFG) des Landes Steiermark gefördert. Das Programm COMET wird durch die FFG abgewickelt. 21