Mobile RFID privacy protection - PowerPoint PPT Presentation

About This Presentation
Title:

Mobile RFID privacy protection

Description:

can be a good substitute for barcode system ... Every reader belongs to a specific group and has its own group ID and public key ... – PowerPoint PPT presentation

Number of Views:126
Avg rating:3.0/5.0
Slides: 26
Provided by: debash6
Category:

less

Transcript and Presenter's Notes

Title: Mobile RFID privacy protection


1
Mobile RFID privacy protection
  • Katayoon Moazzami Debashis Roy

2
Outline
  • Introduction
  • Mobile RFID
  • Components
  • Architecture
  • Privacy Issues in RFID
  • Proposed Solutions for Privacy Issues in RFID
  • RFID Privacy protection using Mobile Agent
  • Another Privacy Protection Scheme for Mobile RFID
  • Comparison of MARP and the Other Method for RFID
    Privacy Protection
  • Conclusion and future work

3
Introduction
  • RFID (Radio Frequency IDentification) is an
    automatic contactless identification system
  • It is based on EPC (Electronic product code)
  • It uses RF signal for communication
  • can be a good substitute for barcode system
  • used in manufacturing, supply chain management
    and inventory control

4
Papers that will be Discussed
  1. H. Lee, J. Kim. "Privacy Threats and Issues in
    Mobile RFID." The First International Conference
    on Availability, Reliability and Security (ARES
    '06), 2006.
  2. S. C. Kim, S. S. Yeo, S. K. Kim. "MARP Mobile
    Agent for RFID Privacy Protection." 7th Smart
    Card Research and Advanced Application IFIP
    Conference (CARDIS '06), Lecture Notes in
    Computer Science, 2006, pp. 300-312.
  3. I. J. Kim, E. Y. Choi, D. H. Lee. "Secure Mobile
    RFID System Against Privacy and Security
    Problems." Third International Workshop on
    Security, Privacy and Trust in Pervasive and
    Ubiquitous Computing (SecPerU07), 2007, pp.
    67-72.
  4. Radio-frequency identification,
    http//en.wikipedia.org/wiki/Rfid

5
Mobile RFID
  • Mobile RFID (M-RFID) can be defined as services
    that provide information on objects equipped with
    an RFID tag over a telecommunication network
  • - C. Seidler, RFID Opportunities for mobile
    telecommunication services, ITU-T Lighthouse
    Technical Paper, May 2005.
  • Reader is embedded in a mobile device

6
Components of Mobile RFID System
  • RFID Tag
  • Consists of two parts
  • Microchip
  • Antenna
  • Three kinds of tags
  • Passive
  • Active
  • Semi-passive
  • Use EPC (Electronic Product Code) structure to
    store information

7
Components of Mobile RFID System (contd.)
  • Mobile Reader
  • Base Station
  • Manages communication among the reader and the
    servers
  • Network Servers
  • Object Information Server (OIS)
  • Contains information about an object
  • Object Name Server (ONS)
  • Contains the URL of OIS

8
Mobile RFID Network Architecture
Mobile RFID Network Architecture Kim et. al.
2007
9
Mobile RFID Network Architecture
  • A mobile reader requests EPC from a tag
  • The tag sends EPC to the mobile reader
  • The mobile reader sends the received EPC to a
    base station
  • The base station requests URL of a server which
    includes information of EPC to ONS server
  • ONS server sends the requested URL to the base
    station
  • Using the received URL the base station requests
    information of EPC from OIS server
  • OIS server sends information of EPC to the base
    station
  • The base station sends information of EPC to the
    mobile reader

10
Privacy Issues in RFID
  • Traceability
  • Tracking the movement of an user or an object
  • Information Leakage
  • Gathering information about user without
    authorization
  • Impersonation
  • Acting as a legitimate user by making a clone tag
  • Additional Privacy Issues for Mobile RFID
  • Reading range of the tag increases
  • Privacy of the reader carrying user

11
Proposed Solutions for Privacy Issues in RFID
  • The Kill Command
  • Deactivates the tag for further reading
  • Tag password
  • tag can be password protected
  • Encryption
  • Encryption of tag data using cryptography
  • Proxying Approach
  • An additional mobile device is used as proxy
  • Reader communicates with tag through the proxy
  • Blocking
  • Uses a privacy bit to restrict public scanning of
    the tag

12
MARP Mobile Agent for RFID Privacy Protection
  • Introduced by Kim,Yeo, Kim in 2006
  • Uses a mobile agent as the proxy of the tag
  • Uses hash function and public-key cryptography
    system.
  • Every RFID user carries a MARP which has the
    information about all user tags

13
The MARP Method
  • MARP method has four phases
  • Initial Setup phase
  • Privacy Protection phase (tag sleep mode)
  • Authentication phase (tag wake mode)
  • Main scheme

14
The MARP Method (contd.)
  • Initial Setup Phase
  • Every reader belongs to a specific group and has
    its own group ID and public key
  • Tag has its PIN and tag ID
  • MARP contains the readers group ID and public
    key
  • MARP also has the tag IDs, PIN and hashed secret
    data
  • The server contains the tag related and the
    reader group related information

15
The MARP Method (contd.)
  • Privacy Protect Phase
  • MARP obtains the secret information of the tag
  • puts the tag into sleep mode
  • communicates with the reader on behalf of the tag
    after authenticating the reader
  • Authentication Phase
  • Server checks the validity of tag

16
The MARP Method (contd.)
  • Main Scheme
  • The authentication between the tag and MARP,
    between the MARP and the reader and between the
    server and tag are done collectively
  • Overall scenario using MARP
  • The PIN of the RFID tag is stored in the shops
    DB after arrival of a good
  • A consumer purchases the good and the PIN of the
    tag is transmitted to the consumers MARP.
  • Some of the tags secret information is obtained
    by the MARP through authentication using the
    tags PIN.
  • The consumer registers the tag and changes the
    PIN for keeping security.
  • Any reader communicates with the MARP instead of
    the tag using public key cryptosystem.
  • If the good transferred to another user, the PIN
    information of the good is sent to the new user.
    The new user will register the tag and change the
    PIN.

17
Analysis of MARP
  • Traceability
  • Only authenticated readers and tags can join the
    communication
  • A tag uses keyed hash function with different
    random number in every session (indistinguishable
    to attackers)
  • Information leakage
  • MARP use public-key system to encrypt data
  • Impersonation
  • MARP only has parts of tags information
  • The server authenticates the tag before
    communication

18
Another Privacy Protection Scheme for Mobile RFID
  • Introduced by Kim, Choi, Lee in 2007.
  • Reader is embedded in a mobile device carried by
    the user
  • Uses only Hash function and random number
  • No public key encryption
  • No use of additional proxy device
  • This scheme has three phases
  • Identification phase
  • Initial setup
  • Privacy protection phase

19
Another Privacy Protection Scheme for Mobile RFID
(contd.)
  • Identification Phase
  • Mobile reader obtains a certificate Cj from the
    local server
  • Mobile reader sends a query to the tag along with
    the certificate
  • The tag sends NIDIDTi hKTi(Cj) to reader and
    reader sends NID to the server
  • The server checks whether Cj is valid and sends
    tag data to the reader.
  • Initial Setup Phase
  • Reader receives a key K from the server
  • This key is used to protect privacy

20
Another Privacy Protection Scheme for Mobile RFID
(contd.)
  • Privacy Protection Phase
  • The mobile reader generates a random number RRi
    and sends it to the tag
  • The tag generates another random number RTi and
    sends PIDIDTi RTi and KIDhKTi(RRi) RTi to
    the reader
  • The reader computes RTi KID hKj(RRi) and
    IDTiPID RTi and sends IDTi to the server
  • The server sends the tag data to the reader.

21
Analysis
  • Information leakage
  • The tag uses a random number and hash function to
    send information to the reader
  • It is almost impossible for the adversary to
    predict the random number
  • Traceability
  • The reader cannot distinguish between the outputs
    of the tags around it if it does not have the
    correct key and random number
  • Impersonation
  • The tag refreshes its random number in each
    session.

22
Comparison of the two methods
  • l the output size of a hash function operation
    or length a key or ID
  • H the cost of a hash function operation
  • X the cost of a exclusive-OR operation
  • E the cost of an encryption operation
  • D the cost of a decryption operation
  • V the cost of verifying signature operation
  • S the cost of a signature operation
  • M the number of tags in an identifying area of
    MARP
  • N the number of keys holding mobile reader
  • - none

23
Our Idea
  • Instead of arbitrarily generating the random
    number the tag should use a function of its
    hardware ID (HID) and time(t) to generate the
    random number (RTi)
  • RTi f(HIDtag,t)
  • Only the legitimate readers will have the HIDtag.
  • The reader can authenticate the tag.

24
Conclusion Future Work
  • Privacy of the reader carrying user ??

25
Thank you for your patience
Any questions
Write a Comment
User Comments (0)
About PowerShow.com