+ All Categories
Home > Documents > RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16...

RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16...

Date post: 12-Aug-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
35
RFID and ticketing application Who? edric Lauradoux EPL/INGI/GSI When? January 22, 2009
Transcript
Page 1: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

RFID and ticketing application

Who? Cedric LauradouxEPL/INGI/GSI

When? January 22, 2009

Page 2: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Outline

• RFID primer

I TechnologyI Information leakageI Malicious tracabilityI Denial of serviceI Relay attacks

• Ticketing primer

I ProblemI Attacks

• when RFID meet ticketing. . .

Page 3: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Radio Frequency IDentification

Page 4: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Radio Frequency IDentificationThe big Napoleon

asymmetric

xor

Distance

yesno

1024

13.56Mhz

900Mhz

2.4Ghz

Frequency

0.20$

0.80$

3$ Crypto

Tamper resistance

124Khz

meters

EPC Gen 2ISO 14443Norms

Memory

Cost

ISO 15963

symmetric

centimeters

128

Page 5: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Radio Frequency IDentificationIdentification

Definition The result of an identification protocol is the identity claimed bythe queried RFID tag.

Alice the tagBob the door

Alice

Who are you ?

Page 6: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Radio Frequency IDentificationAuthentification

Definition The result of an authentification protocol is the genuine identityof a(the) participant(s).

Alice the tagBob the door

f (k , n1, Id)

n1

(k , Id) (k , Id)

In brief:

Authentification = Identity + Proof.

Page 7: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Frequency band

• 125–134 kHz (LF): Pet identification, livestock tracking. . .

• 13.553–13.567 MHz (HF): Smartcards, libraries. . .

• 860–960 MHz (UHF): Supply chain tracking. . .

• 2.4000–2.4835 GHz (UHF): Highway toll, vehicle fleet. . .

Page 8: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Normslost in translation ??

ISO Identification protocols:

10536

18046

2471018185

17366

1541824721

19789

15459

18047

14443

159631178417367

17368

15693

1178517365

1976218000

15961

Page 9: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Radio Frequency IDentificationBeijing Olympic Games

First event of this scale to use RFID:

• 16 millions RFID tags used (224)

Tags usage:

• ticket anti-counterfeiting system

• food production and delivery monitoring

• subway and hotels access control

Next event, the Universal Exhibition (Shanghai 2010):

• 70 millions tickets (226)

Page 10: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Radio Frequency IDentificationBeijing Olympic Games

Tag technology:

• 13.56 Mhz range 1-10cm;

• ISO 14443B;

• No cryptographic capabilities;

• TMC products THR1064.

Reader technology:

• CPLD centric (reconfigurable);

• Software Defined Radio;

• PDA interface.

Page 11: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Tag

Mem

ory

RF

−in

terf

ace

Col

lisio

n

Interface

ALU

Authen.

Page 12: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

RFID and security

• Information leakage

Okay, you got us. . . crypto what ?

• Malicious tracability

We don’t care !

• Relay attacks

What the hell is that ?

• Denial of service

. . . . . . ?

Page 13: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Malicious traceability

Definition An adversary should not be able to track the tag holder:impossibility to correlate the tag interactions with the context ofthe usage.

Alice the tagBob the door

Got you!

f (k , n1, Id)

n1

n1

f (k , n1, Id)

(k , Id)(k , Id)

f (k , n1, Id)

n1

Page 14: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Malicious traceabilityTag architecture

Mem

ory

RF

−in

terf

ace

Col

lisio

n

Interface

ALU

RN

G

f k

Id

Page 15: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Malicious traceability

Page 16: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Malicious traceabilityData analysis in forensic

E

c2 ∈ F2m ,m ≤ n

t1, p2, Id1

F2n

E

t1, p1, Id1

c1 ∈ F2m ,m ≤ n

Choices for E :

• plaintext, transposition differential analysis

• adaptative compression ??

• strict avalanche criteria functions ??

• cryptography side-channel attacks

Page 17: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Tonight word:

Definition Anonymity – [. . . ] the term typically refers to a person, andoften means that the personal identity, or personally identifiableinformation of that person is not known.More strictly, and in reference to an arbitrary element [. . . ],within a well-defined set (called the ”anonymity set”),”anonymity” of that element refers to the property of thatelement of not being identifiable within this set. If it is notidentifiable, then the element is said to be ”anonymous”.WIKIPEDIA

Definition Anonymity – we don’t put your data into the database.STIB, RATP. . .

Page 18: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Relay attacksChess player problem

1. d41. d4

1. .. Cf6 1. .. Cf6

Rusé ce Jean−Pierre !

Page 19: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Relay attacksin RFID.

Bob the door Alice the tag

Bob the door

Alice the tag

f (k , n1, Id)(k , Id) (k , Id)

n1

n1

(k , Id)f (k , n1, Id)

(k , Id)

Page 20: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Relay attacksSolution

Round Trip Time ?

Problem

• BCET• WCET

• σ ?• reception t2

• ok if δt < σ

Verification

(n1 ◦ t1)

F (n1 ◦ t1, k , Id)

• f −1(n1 ◦ t1, k , Id)

Page 21: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Relay attacksMore headaches !

• Attacker model:

I freeze the time

I speed the time

I he is all-mighty !

• On tag solutions:

I don’t dream no clock !

I any computation is a potential noise for the result.

Page 22: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Relay attacks3 types of attacks

• Mafia fraud: the basic attack.

• Distance fraud: the prover cheats by sending early answer.

• Terrorism fraud: the prover colludes with the attackerwithout revealing its secret key.

The solutions are the distance-bounding protocols.

Page 23: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Denial of services

DoS is important in a competition context:

• RF Jammer: secure spread spectrum;

• Collision Jammer: improved algorithms;

• ElectroMagnetic Pulse: no possible solution.

Almost unvoidable attacks:

• Important to know your enemy;

• Critical to know what can do your commpetitor to ternishyour reputation;

• Fun.

Page 24: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Ticketing applicationsAn access control problem

Page 25: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Ticketing problemThe players

Don’t want to know any complex stuffs

The thief

The customer

The stewardResponsible for the customers line

Don’t like to wait (short line)

Hold the ticket (don’t expect anything else)

The owner

Designer of the system

A few constraints: money, time...

Collusion with the thief to increase profit

Unlimited evilness

Collusion with the owner

Smart: through time find always all the weaknesses

Page 26: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Ticketing problemThe rules

??

check

checkcollusion

control

collusion

sell

Specific attacks on ticketing systems:

• Counterfeit one for many;

• Pass-back a few for many;

• Illegal multiple sales many for many;

• Black market money for money.

Page 27: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Counterfeit

sell 63

check 63

check 63

control

counterfeit 63

Page 28: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Counterfeit: ticket like bills ?. . . or can we take advantage of money anti-counterfeiting system

Paper anti-counterfeiting system:

• special paper;

• special ink;

• holography;

Hard to check !

Page 29: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Pass-back

t1 t2 t3 t4

Page 30: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Pass-Back

t1, t2, t3, t4

Page 31: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Pass-back

t1 t2 t3 t4

Page 32: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Pass-back

Page 33: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Pass-backCoupon

Disavantages:

• one shot;

• not resistant to collusion;

Page 34: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

Black market and illegal multiple sales

I am not Santa Claus !

Page 35: RFID and ticketing application - UCLouvain · First event of this scale to use RFID: † 16 millions RFID tags used (224) Tags usage: † ticket anti-counterfeiting system † food

RFID and ticketing

I have a dream of an RFID ticketing solutions that is:

• efficient;

• secure;

• cheap (no crypto on tag);

• compatible;

• simple (this is a dream);

I am free to forget:

• privacy;

• relay;

• other complex stuffs;


Recommended