draft irtf hiprg rfid 01
play

draft-irtf-hiprg-rfid-01 HIP support for RFIDs - PowerPoint PPT Presentation

draft-irtf-hiprg-rfid-01 HIP support for RFIDs Pascal.Urien@telecom-paristech.fr http://perso.telecom-paristech.fr/~urien/hiprfid/ http://www.telecom-paristech.fr 1 /11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China What


  1. draft-irtf-hiprg-rfid-01 HIP support for RFIDs Pascal.Urien@telecom-paristech.fr http://perso.telecom-paristech.fr/~urien/hiprfid/ http://www.telecom-paristech.fr 1 /11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

  2. What is new in version 01 Editorial issues Replace the word TAG (inherited from the previous draft HIP-TAG) by RFID HIP TAG) by RFID The Signature-T attribute is renamed MAC-T The HAT (HIP Address Translation) protocol is renamed HEP (HIP Encapsulation Protocol) HEP (HIP Encapsulation Protocol) Keys-Tree improvement Simulations of various scenarios show that a tree of depth n, with p**n elements (p child nodes per node) is ith ** l t ( hild d d ) i optimized for p a big integer (10 6 , …) and n small integer (<10) RFID have small computing resources RFID have small computing resources PORTAL have powerful computing resources Paper to be published E Experimental platforms i t l l tf Tests were performed with smart phone equipped with the NFC technology and SIM (java) cards Paper to be published b bl h d 2 /11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

  3. Keys-Tree A Keys-Tree manages a maximum of p n RFIDs, with np keys Each RFID stores n keys K 1,1 RFID-Index = Function(EPC-Code) K 2,1 K 2 1 a n p n-1 + a n-1 p n-2 +… + a 1 Tree Each term a i is associated with a K 3 4 depth=n depth n 3,4 key K i,j p child nodes 1 ≤ i ≤ n K K 4,2 0 ≤ j ≤ p-1 j= a i f(r1,r2,EPC-Code)= H 1 |H 2 |…|H n Hi = HMAC(r1|r2, K i,j ) 3 /11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

  4. HIP-RFID for NFC Smart phone NFC ENABLE SIM CARD SMART PHONE HIP PORTAL RFID JAVA 1.6 PC/SC USB NFC NFC CCID MODEM READER 4 /11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

  5. Conclusion: To be done HIT structure for pseudo-random coding Secure Channel establishment Secure Channel establishment To be specify by an other draft HEP (HIP Encapsulation Protocol) HEP (HIP Encapsulation Protocol) To be specify by an other draft Open code for Keys-Tree Open code for Keys Tree Other ? 5 /11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

  6. HIP-RFID in a Nutshell 6 /11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

  7. About RFIDs What is an RFID ? An RFID is an electronic device that delivers an identity (ID) thanks to radio means (ID) thanks to radio means. Link with the Internet Of Things (IoT) A Thing is associated with a RFID RFID have limited computing resources h l d Electronic chip, whose area ranges from 1mm 2 to 25mm 2 RFIDs are usually powered by readers. RFIDs are usually powered by readers. Very low power consumption. Objective of this draft Defining a protocol for RFIDs , compatible with the IP D fi i t l f RFID tibl ith th IP ecosystem. Enforcing strong privacy , i.e. no information leakage for unauthorized ears unauthorized ears. Managing secure channel with RFIDs (Optional) Crypto Agility : cryptographic procedures adapted to RFIDs computing resources. ti 7 /11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

  8. Privacy issues for RFIDs ID MUST be protected HIP-RFID: ID is a solution of f(r1 r2 ID) HIP RFID: ID is a solution of f(r1,r2,ID) r1 RFID Reader r2 , f(r1,r2, ID) ID Example Many proposal in the scientific literature Many proposal in the scientific literature Example: f(r1,r2, ID) = hash (r1 | r2 | ID) S. Weis, S. Sarma, R. Rivest and D. Engels. "Security and privacy aspects of low-cost radio frequency identification systems." In D. Hutter, G. Muller, W. Stephan and M. Ullman, editors, International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of Lecture Notes in computer Science pages 454- 469 Springer-Verlag 2003 Notes in computer Science, pages 454- 469. Springer-Verlag, 2003. 8 /11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

  9. HIP -RFID Overview Modified BEX exchange Negotiation of the security scheme (HIT-T-TRANSFORM attribute). Thi d Third and fourth message are MACed (typically with a HMAC d f th MAC d (t i ll ith HMAC function) Fourth message is optional, only mandatory when a secure ESP channel has been negotiated channel has been negotiated. This is not yet detailed in this draft ESP MAY be used for read write operation. Th HIT i The HIT is a random number d b RFIDs never expose their identity in clear text, but hide this value (typically an EPC-Code) by a particular equation (f) that can be only solved by a dedicated entity, referred as the portal. l d b d di t d tit f d th t l f(r1,r2, ID) f can be anything that works f y g An integrity key is computed from KI-AUTH-KEY = g(r1,r2,ID) HIP exchanges occurred between RFIDs and PORTALs; they are shuttled by IP packets, through the Internet cloud. shuttled by IP packets, through the Internet cloud. 9 /11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

  10. HIP-RFID Architecture Id Identity tit HIP HIP Solver HIP SPI-I HEP HEP ID IP IP SPI-R RFID MAC RFID-MAC MAC MAC MAC RFID-MAC ID RFID-PHY RFID-PHY PHY PHY RFID RFID Reader Reader Portal Portal HEP: HIP Encapsulation Protocol HEP: HIP Encapsulation Protocol 10/11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

  11. Protocol Overview RFID READER PORTAL --+-- --+-- ---+--- ! START ! ! Fix or !<---------------! ! NULL value NULL l ! ! ! ! ! ! ! I1-T ! (partially ?) ! HIT-I HIT-R ! Random ! ----------------------------------------------------> ! ! ! Random value Random value value l ! ! Mandatory ! R1-T ! ! HIT-I HIT-R R-T(r1) HIP-T-Transforms ! ! [*ESP-Transforms] ! ! <---------------------------------------------------- ! ! < ! ! ! Random value ! ! ! I2-T ! HMAC(KI, I2-T) ! HIT-I HIT-R HIP-T-Transform [*ESP-Transform] R-T(r2) ! ! ! F-T=f(r1, r2, ID) [* ESP-Info] MAC-T ! F T f( 1 2 ID) [* ESP I f ] MAC T ! ! ----------------------------------------------------> ! ! ! ! ! ! R2-T ! HMAC(KI, R2-T) HMAC(KI R2-T) ! HIT-I HIT-R [* ESP-Info] MAC-T ! ! <---------------------------------------------------- ! ! ! ! Optional p ! ! ! ! Optional ESP Dialog ! Optional ESP Dialog ! <---------------------------------------------------> ! ! ! ! ! 11/11 Pascal URIEN, IETF 79 th , Tuesday 9 th November 2010, Beijing, China

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend