Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan



Similar documents
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

A Secure RFID Ticket System For Public Transport

50 ways to break RFID privacy

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Data Security in Unattended Wireless Sensor Network

Mécanismes de Restauration de. Privacy pour les Systèmes. RFID Offlines. Gildas AVOINE, Iwen COISEL, Tania MARTIN. Journées C2 Octobre 2012

Security in RFID Networks and Protocols

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

RFID Security and Privacy

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

Strengthen RFID Tags Security Using New Data Structure

Lecture 9 - Message Authentication Codes

Back-end Server Reader Tag

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

MACs Message authentication and integrity. Table of contents

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

New Directions in RFID Security

A Study on the Security of RFID with Enhancing Privacy Protection

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation

Authentication requirement Authentication function MAC Hash function Security of

Security Requirements for RFID Computing Systems

Secure Anonymous RFID Authentication Protocols

Electronic Voting Protocol Analysis with the Inductive Method

How To Hack An Rdi Credit Card

Message Authentication Code

Storage Systems Autumn 2009

A Study on Computational Formal Verication for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication

Tackling Security and Privacy Issues in Radio Frequency Identification Devices

1 Message Authentication

SOME SECURITY CHALLENGES IN CLOUD COMPUTING. Hoang N.V.

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

A Secure Decentralized Access Control Scheme for Data stored in Clouds

Privacy and Security in library RFID Issues, Practices and Architecture

Introduction. Digital Signature

MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

1 Construction of CCA-secure encryption

IoT Security Platform

Information Security Basic Concepts

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Single Sign-On Secure Authentication Password Mechanism

RFID Security: Threats, solutions and open challenges

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Authentication and Encryption: How to order them? Motivation

Enabling the secure use of RFID

Scalable RFID Security Protocols supporting Tag Ownership Transfer

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

Advanced Topics in Cryptography and Network Security

RFID Authentication Protocol for Low-cost Tags

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

A Framework for Secure and Verifiable Logging in Public Communication Networks

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

E-Democracy and e-voting

How To Understand The Concept Of Internet Of Things (Iot)

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Secure APIs and Simulationbased. Exposé thésard

RFID Security and Privacy: A Research Survey. Vincent Naessens Studiedag Rabbit project

Security Analysis of DRBG Using HMAC in NIST SP


Anonymous ID-based Group Key Agreement for Wireless Networks

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)

Efficient Unlinkable Secret Handshakes for Anonymous Communications

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

Privacy in Deniable Anonymous Concurrent Authentication with Setup is Impossible

VoteID 2011 Internet Voting System with Cast as Intended Verification

Privacy & Security of Mobile Cloud Computing (MCC)

Capture Resilient ElGamal Signature Protocols

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Democratic Group Signatures on Example of Joint Ventures

Verifying Correctness of Trusted data in Clouds

Information Security

Victor Shoup Avi Rubin. Abstract

A Privacy Preserving of Composite Private/Public Key in Cloud Servers

Big Data - Security and Privacy

Cryptography for the Cloud

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Secure and Serverless RFID Authentication and Search Protocols

SSL A discussion of the Secure Socket Layer

Persistent Security for RFID

SCADA System Security, Complexity, and Security Proof

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

On the Security of RFID

Modeling and verification of security protocols

Proxy Framework for Enhanced RFID Security and Privacy

Currency and Correctness of Content in Object Storage Networks

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

A Generic Framework for Three-Factor Authentication

Improving data integrity on cloud storage services

Chapter 1: Introduction

Transcription:

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1

Internet of Things (IoT) CASAGRAS defined that: A global network infrastructure, linking physical and virtual objects through the exploitation of data capture and communication capabilities. This infrastructure includes existing and evolving Internet and network developments. It will offer specific object identification, sensor and connection capability as the basis for the development of independent federated services and applications. These will be characterised by a high degree of autonomous data capture, transfer event network connectivity and interoperability. Source: CASAGRAS Meeting 2

Internet of Things (IoT) CASAGRAS s inclusive model Source: The CASAGRAS Goal 3

My talk IoT Security Common Security/privacy between RFID and IoT Different Security/privacy between RFID and IoT Solved problem Unsolved problem Target devices for IoT: RFIDs Sensors Smart Phones (future devices, etc.) 4

The existing effort in cryptography Internet of Things consists of RFIDs Sensors Smart Phones (future devices, etc.) Number of papers in IACR eprint Archive: Internet of Things, IoT 0 hit RFID 52 hit Sensor 23 hit Mobile phone, Mobile device, Mobile (ad hoc) network 12 hit 5

How to construct secure protocols for IoT Abstract the requirement for IoT Define proper security/privacy model Propose a cryptographic protocol Provide rigorous security proof This flow has been used in any cryptographic schemes and protocols. 6

How to construct secure protocols for IoT Abstract the requirement for IoT This talk Define proper security/privacy model Propose a cryptographic protocol Provide rigorous security proof Object identification in IoT is mainly solved by RFID technology, and there are many results for RFID authentication protocol Let s refer and compare them to construct the security model for IoT! 7

The existing RFID research in cryptography Cryptographers concentrate on RFID authentication protocol Tag Reader Database authentication accept/reject RFID authentication protocol provides: tag s authentication and tag s privacy (reader s authentication as optional) Several researcher consider additional properties Distance Bounding protocol Ownership transfer protocol Accept Reject Authentication right 8

Several unsolved problems 1. Suitable security model We analyzed the relationship among the security models 2. Identification vs. authentication 3. Real Life Requirements for RFID 9

Problem 1: suitable security model There are several security models for RFID authentication Juels Weis (PerCom 2007, ACM TISSEC 2009) Indistinguishability based major Vaudenay (ASIACRYPT 2007), Paise Vaudenay (ACMCCS 2008) Simulation based major Deng Li Yung Zhao (ESORICS 2010) Zero knowlege based Burmester Li Medeiros Tsudik (ACM TISSEC 2009) Universal composability based Ha Moon Zhou Ha (ESORICS 2008) Unpredictability based and many minor variants 10

Problem 1: suitable security model Juels Weis security model: Tag Reader Database authentication accept/reject Correctness: Tags Reader Security: Tags Adv Reader accept reject When the protocol is honestly executed, the reader accepts the tags Except the relay attack and corrupt tags, the reader does not accept the tags when an adversary interferes the message 11

Problem 1: suitable security model Juels Weis security model: Tag Reader authentication accept/reject Privacy: Tag or Adv Reader The adversary cannot distinguish whether he interacts with tag or. 12

Problem 1: suitable security model Juels Weis security model: ( and are prohibited) Output anonymously interacts with This is a slight variant proposed by Deng Li Yung Zhao (ESORICS 2010) This definition is based on [IND CCA security for PKE] / [anonymity for IBE] as a reference If we allow to issue Reveal queries to and, we need public key cryptography to satisfy the modified model 13

Problem 1: suitable security model Indistinguishability based formal privacy definition is useful to provide the security proof. However, only few (rigorous) relationship among the security models is proved. Ma Li Deng Li (ACMCCS 2009) proved that Indistinguishability based privacy Unpredictability based privacy We analyzed the other security models based on the several results for public key encryption. We recently found that Indistinguishability based privacy Simulation based privacy Zero knowledge based privacy 14

Problem 2: identification vs. authentication Many researcher describe authentication protocol for RF Identification The reader outputs accept or reject (for Result query) The reader outputs identity or (for Result query) (The adversary can obtain information more than one bit if we actually treat it as identification) Only authentication is necessary? Why? I think the existing protocols are Radio Frequency Authentication (RFAU)! It may cause a problem when the protocol is embedded in IoT 15

Problem 3: real life requirements for RFID On off control I don t know the identity, but he is wearing a wig! (because my reader received a response) Cryptographic solution: Reader authentication is needed before the tag responds a message, but digital signature is too expensive to compute. Another solutions: Breaking the RFID tag s circuit is not good solution since the tag cannot be reused. Physically protection (e.g. foil wrapping) may be difficult in some cases. 16

Problem 3: real life requirements for RFID Secrecy/integrity/availability of stored data Several types of Tags can contain the Identity, secret key for authentication and usable data Utilizing the data in RFID tag (in addition to Identity) is one of the attractive point (manufacturer, production date, expiration data) Several data should be protected or verified, however cryptographers only study RFID authentication protocol now For the resource constraint, some kinds of merged scheme/protocol will be valuable Example in public key crypto: Signcryption (faster than Encrypt + Sign ) 17

Problem 3: real life requirements for RFID Life cycle of the tag Some data on RFID tag (e.g. indication of origin) should be declared and not be modified However, special commands for (partially) erasure is useful to reuse the tag In addition to the transmission of the ownership (ownership transfer protocol), how to manage the tag s data/identity/ownership respectively is important in the realistic setting 18

What are the additional requirements in IoT? Data integrity < it is necessary in sensor network Data secrecy < it is also necessary in sensor network Primary sender < who generates the data should be specified Key Management < how to keep/update/recover a secret is one of the main issue in all protocols We should abstract the realistic requirement to the cryptographic oriented notion as possible as we can. We can refer many types of security model in public key cryptography Anonymous IBE indistinguishability of data and identity Forward signature unforgeability, forward security Group signature unforgeability, anonymity, unlinkability, traceability Key exchange impersonation, unknown key share, key leakage 19

What are the additional requirements in IoT? In RFID authentication, researchers assume that the reader (and the background database) has enough computation resources However, it may be smart phone in IoT! This gap is not considered It is important to define the actual roll (tag, reader, sensor, etc.) of the Things It should also be discussed in the IoT environment I will send you the weekly data I obtained. I am now computing fully homomorphic encryption. Please wait 1 year! Depending on the specific wide environment, we should organize the security requirement, choose the security model and propose an efficient protocol to spread the world of IoT! 20

Conclusion 52+ papers IoT Security Suitable security model to construct convenient protocols based on symmetric key cryptography 52 papers Authentication + privacy Common Security/privacy between RFID and IoT Different Security/privacy between RFID and IoT integrity + secrecy + 52 papers 0 paper Solved problem Unsolved problem Relationship among security models indistinguishability authentication authentication identification Life cycle 21

Thank you for your attention! 22