+ All Categories
Home > Documents > On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented...

On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented...

Date post: 17-Jan-2016
Category:
Upload: christal-ford
View: 218 times
Download: 0 times
Share this document with a friend
Popular Tags:
20
On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu
Transcript
Page 1: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

On The Untraceability of Anonymous RFID

Authentication Protocol with Constant Key-Lookup

Presented By Professor LI Yingjiu

Page 2: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

2

Outline

• Background

• Review the BMM protocol in AsiaCCS’08

• Crack the Protocol by three-run interleave attack

• Crack the supply chain based on our attack

• Improve the BMM protocol

• Conclusion

Page 3: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Background

• It is still a challenge to balance the security and scalability.

• For example,– The OSK protocol needs O(N) hash

calculation.– Numerous protocols based on tree-structure

suffers from de-synchronization attack and compromising attack.

• It is emergent to setup a protocol balancing both the security and scalability.

3

Page 4: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

BMM protocol in AsiaCCS’08

• Burmester, Medeiros and Motta (BMM) proposed an RFID authentication protocol with constant key-lookup to balance the security requirement and scalability.

• The protocol is based on challenge-response technique.

• Guarantee spoofing attack, replay attack, de-synchronization attack, etc..

4

Page 5: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Overview of BMM Protocol

5

Page 6: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Initiate System

6

Page 7: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Mutual Authentication

• Tag Reader

7

Page 8: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Update Process

• Tag Reader

8

Page 9: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Three-run Interleave Attack

• This attack can trace the same tag by ‘ps=r’.

• The reason is updating ‘ps’ inappropriately.

• Include three steps.

9

Page 10: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Three-run Interleave Attack---Run 1

10

Page 11: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Three-run Interleave Attack---Run 2

11

Not Update ‘r’

Page 12: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Three-run Interleave Attack---Run 3

12

Page 13: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Discussion

• Note that in the third run, a different challenge c’’ could be used by a trusted reader to challenge the tag. As long as the ‘r’ value is not updated in the second run, the ‘ps’ value is still the same as the one in the first run.

13

Page 14: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Crack the Whole Supply Chain

• Three assumptions:– Trusted zone– One-time authentication– Sticky adversary

• Two attack strategies:– Trace a single tag– Trace multiple tags

14

Page 15: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Crack a Supply Chain System Based on BMM Protocol

15

Page 16: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Trace a Single Tag

16

Page 17: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Trace Multiple Tags

• Adversary’s database for tracing multiple tags

17

Page 18: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Improve BMM Protocol

18

Page 19: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

Conclusion

• Under a weak adversary model, an attacker can launch a three-run interleave attack to trace and identify a tag.

• Attackers can crack the whole supply chain using BMM protocol.

• We improve BMM protocol to prevent tags from tracing.

• The improved Protocol is same efficient as BMM protocol.

19

Page 20: On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.

20


Recommended