+ All Categories
Home > Documents > 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product...

1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product...

Date post: 11-Jan-2016
Category:
Upload: merry-morris
View: 222 times
Download: 0 times
Share this document with a friend
Popular Tags:
35
1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism Advanced Information Systems Engineering Lab Saitama University, Japan 2007-March-13 S.K.K.H. Sabaragamuwa, S. M. Reza, J. Miura, Y. Goto, and J. S.K.K.H. Sabaragamuwa, S. M. Reza, J. Miura, Y. Goto, and J. Cheng Cheng Department of Information and Computer Sciences, Department of Information and Computer Sciences, Saitama University, Saitama, 338-8570, Japan Saitama University, Saitama, 338-8570, Japan {krishan, selim, miura, gotoh, cheng}@aise.ics.saitama-u.ac.jp {krishan, selim, miura, gotoh, cheng}@aise.ics.saitama-u.ac.jp
Transcript
Page 1: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

1

POP MethodAn Approach to Enhance the Security and Privacy

of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring

Mechanism

Advanced Information Systems Engineering LabSaitama University, Japan2007-March-13

S.K.K.H. Sabaragamuwa, S. M. Reza, J. Miura, Y. Goto, and J. ChengS.K.K.H. Sabaragamuwa, S. M. Reza, J. Miura, Y. Goto, and J. ChengDepartment of Information and Computer Sciences,Department of Information and Computer Sciences,

Saitama University, Saitama, 338-8570, JapanSaitama University, Saitama, 338-8570, Japan{krishan, selim, miura, gotoh, cheng}@aise.ics.saitama-u.ac.jp{krishan, selim, miura, gotoh, cheng}@aise.ics.saitama-u.ac.jp

Page 2: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

2

Goal and Objectives Goal

The goal is to originate a way to enhance the security and privacy of RFID tagged products in product life cycle by enabling ownership transferring mechanism with novel communicational protocol.

Objectives1. Discover a security & privacy enhanced communication

mechanism for RFID tagged products in product lifecycle.

2. Define application layer protocols for RFID communication in product life cycle.

3. Derive an ownership transferring mechanism for RFID tagged products throughout the product life cycle

Page 3: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

3

Agenda

Background MotivationSolutionContributionConclusion

Page 4: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

4

Background

Page 5: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

5

What is the problem?

The secret stored inside the RFID tag may be read/modified by more than one party who may or may not allow to access it.

Therefore the RFID tagging creates the security risks and privacy threats for the individuals as well as for corporations throughout the product lifecycle.

Page 6: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

6

Why does the problem occur? The same passive tag is used throughout product life cycle

from the point of production up-to the product recycling.

It is easy to buy a RFID tagged product and find out the information inside the tag by reverse engineering it.

Since the RFID signal range is larger and contact-less, communication between tags and readers are susceptible to interference and interception.

It is unable to employ strong security mechanisms on passive tags as they are low in computational power & programmability, small in memory capacity, and also constraint by cost.

Tags cannot be switched-off and also tag answers without the agreement of their bearers.

Page 7: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

7

Motivation

Page 8: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

8

Why we must solve the problem?-I

Almost every thing in the world is to be uniquely numbered by embedding a RFID tag as the process automation efficiency and usability can be improved.

It is the passive tag, which are acceptable to be used in the domain of product lifecycle as the cost constraints exists.

Extensive use of RFID tags has been limited as it creates threats to security and privacy.

Corporate and individual privacy Data/information and communication security

No proper mechanism to transfer the ownership and also to allow the multiple authorizations of tagged products.

Page 9: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

9

Easy access and autonomous Can improve the automated processing Will greatly reduce the need for manual scanning

Efficient Tracking is possible Can store fairly decent information set

Item’s serial number, Color, Size, Manufacture date and Current price, as well as a list of all distribution points the item touched before arriving at a store.

Non-contact, non-line-of-sight reading, read/write capability Improve inventory, warehousing, distribution, logistics, and

security

Why we must solve the problem?-II

Page 10: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

10

Proposed solution

Page 11: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

11

Solution Outline Assumptions Product lifecycle Tag memory Proposed flow of tagged products Point of Sales After purchase Ownership Transference Multiple authorization Characteristics of proposed solution Communication protocols Recycling of tagged products

Page 12: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

12

Assumptions Proper radio communication is available Tags are having rewritable memory Tags are having 10000~15000 total gate count Capability of reading and writing Able to Disable or Kill the tag at the POS (Point of Sales) Interrogator (Reader) should have the writing capability Tags memory capacity should be at least 512 bits

including minimum programmable memory of 256 bits 96bits for EPC and 16 bits CRC 80bits for Authentication Key 48bits for Shared Secret key

Page 13: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

13

Product Manufacturer

Distributors/Resellers/Warehouses

Retail Stores

Recycling of Products

Logistics

Customer 2nd 3rd 4th

Product Usage

Customer sells the product to

another customer

Logistics

Product lifecycle1

21

31

4

5

6 7

8

9

Page 15: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

15

Memory structure of the Tag

Tag ID (EPC) 96 bits

Shared Secret48 bits

S

Enabled orDisabled

1bit

Cryptographic Key 80 bits

Ka

Encryption/Decryption and Pseudo Random Number Generator

Module forProtocol Processing

Tag GeneratedNonce

48bits NT

Nonce from Interrogator

48bits NI

InterrogatorID 32bits

IID

Rew

ritab

le

Ses

sion

Ow

ner

data

Actor 1 Actor 2

EnabledEPCSKa EnabledEPCS’K’a

Page 16: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

16

How to change the ownership

PR

IVA

CY

SEC

UR

ITY

Ka SaEPC E

Kb SbEPC E

Kd SdEPC E

Ke SeEPC E

Kf SfEPC E

Kg SgEPC E

Kh ShEPC E

Ki SiEPC E

Kj SjEPC E

Kk SkEPC E

Kl SlEPC E

EPC E

EPC E

EPC E

Kc ScEPC E

Page 17: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

17

Point of Sales

Customer card Contains the 80 bits number card key

Customer PIN number Will have to remember their own number

Page 18: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

18

Point of Sales Tag data is changed in POS

80 bits Authentication key 48 bits Shared Secret key

Customer Card & PIN number PIN number will be assigned to for 48 bit Shared Secret

key Card key will be assigned to 80 bits Authentication key By swiping the card and key-in the PIN number once for

all items purchase at any given time. The card and the PIN number will allow smart home

appliances to protect the security and privacy Disable the tag

No more use of RFID tag after the purchase

EEPCS48 bits

K80 bits

Encryption & Decryption

Other Parts of the TagDisable Disable EnableEnable

Page 19: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

19

After purchaseSmart appliances with RFID tags

Each smart device at home will consist of Key pad and proximity or swipe card reader to input your shared secrets

Each smart device will have their own database and reader in it

Page 20: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

20

Transferring ownership Seller will have to swipe his card and enter his PIN

number for the product to trusted transferring point Buyer will have to swipe his card key and enter his

PIN number

Page 21: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

21

Multiple authorization This is necessary in case of product recall, repair or

return

Since these actions should carry out with the consent of the owner of the product each party who expect to read the product tag need to transfer the ownership to proceed

Page 22: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

22

Characteristics of proposed solution

Algorithm Grain1 stream cipher algorithm 1650 gate count Lightweight and 80 bits Cryptographic Key

Protocols design Authentication Reading Writing

Security Proper authentication before reading or writing Changing the shared secrets in defined frequency Usage of nonce makes duplication extremely difficult Cryptographic key is 80 bits long

Page 23: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

23

Protocol outline

1. Reading the EPC

2. Disabling the Tag

3. Changing Shared Secret

4. Changing Cryptographic Key

5. Changing both Shared Secret and Cryptographic key

Page 24: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

24

Protocol outline

Page 25: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

25

Protocol outline

Page 26: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

26

Recycling of tagged products

Each product to be recycled should change the tag data as follows

Should assign NULL for two Secrets

S:=NULLK:=NULL

Same method can be used in each stage to remove the damaged products

EEPC

Encryption & Decryption

Other Parts of the Tag

K S

Page 27: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

27

Contribution

Page 28: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

28

Devise New process flow for RFID tagged products Re-assigning method of shared secrets when changing hands

over the product lifecycle

Anonymous ownership transferring method for tagged products even after purchase without using database

New protocols for secured authentication, reading and writing of data in RFID tag

Introduced security and privacy enhanced use of RFID tagged products from production to its recycling

A method for recycling RFID tagged products using the same structure

Page 29: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

29

Conclusion

Page 30: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

30

Conclusion

Allow anonymous ownership transference

Enhance security

Protect privacy

Single protocol and light weight algorithm is used

throughout the product life cycle

No need to implement multiple authorization

Page 31: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

31

The POP (Product flow with Ownership transferring Protocol) Method

Is an approach to enhance the security and privacy of RFID tagged products in product lifecycle by enabling anonymous ownership transference. It requires the tag to have a rewritable memory and a simple logic circuit. These requirements are practical and easy to implement though currently cost constraint exists.

Conclusion

Page 32: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

32

Thank you very much for your

attention !!!.....

Thank you very much for your

attention !!!.....

Page 33: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

33

Q & A

Page 34: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

34

Thank youThank you

Page 35: 1 POP Method An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.

35

K. H. S. Sabaragamu Koralalage, Mohammed Reza Selim, Junichi Miura, Yuichi Goto, and Jingde Cheng: POP Method: An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism, Proceedings of the 22nd Annual ACM Symposium on Applied Computing (SAC '07), pp. 270-275, Seoul, Korea, ACM Press, March 2007.


Recommended