Privacy Challenges in RFID Gildas Avoine Information Security Group - - PowerPoint PPT Presentation

privacy challenges in rfid
SMART_READER_LITE
LIVE PREVIEW

Privacy Challenges in RFID Gildas Avoine Information Security Group - - PowerPoint PPT Presentation

Privacy Challenges in RFID Gildas Avoine Information Security Group Universit e catholique de Louvain Belgium SUMMARY Background about RFID Privacy: Information Leakage Privacy: Malicious Traceability Is Privacy a Research Challenge?


slide-1
SLIDE 1

Privacy Challenges in RFID

Gildas Avoine Information Security Group Universit´ e catholique de Louvain Belgium

slide-2
SLIDE 2

SUMMARY

Background about RFID Privacy: Information Leakage Privacy: Malicious Traceability Is Privacy a Research Challenge?

slide-3
SLIDE 3

BACKGROUND ABOUT RFID

Background about RFID Privacy: Information Leakage Privacy: Malicious Traceability Is Privacy a Research Challenge?

slide-4
SLIDE 4

Definitions

Technical View

Radio Frequency IDentification (RFID) consists in remotely retrieving datas (identifier and potentially additional datas) using devices called RFID tags. An RFID tag contain a microcircuit (chip) and an antenna to enable it to receive and respond to radio-frequency queries from an RFID reader/writer. An RFID tag can be a low-capability device e.g. for pet identification, but also a powerful contactless smartcard e.g. for biometric passports.

Credit: Gildas Avoine

Gildas Avoine Privacy Challenges in RFID 4

slide-5
SLIDE 5

Architecture

Reader T ag Reader T ag T ag T ag Back-end System

Gildas Avoine Privacy Challenges in RFID 5

slide-6
SLIDE 6

RFID Applications

Basic Applications

www.aeroid.co.uk www.rfid-library.com www.flickr.com www.safetzone.com

Supply chain tracking.

  • Track boxes, palettes, etc.

Libraries.

  • Improve book borrowing and inventories.

Pet identification.

  • Replace tattoos by electronic ones.
  • ISO11784, ISO11785.

Localisation.

  • Children in amusement parks, Elderly people.
  • Counting cattle.

Gildas Avoine Privacy Challenges in RFID 6

slide-7
SLIDE 7

RFID Applications

Evolved Applications

Credit: G. Avoine Credit: G. Avoine www.carthiefstoppers.com www.brusselnieuws.be www.bajabeach.es blogs.e-rockford.com

Building access control.

  • Eg. UCL, MIT.

Automobile ignition key.

  • Eg. TI DST, Keeloq.

Public transportation.

  • Eg. Brussels, Boston, Paris, ..., Thalys.

Payment.

  • Eg. Visa, Baja Beach Club.

Electronic documents.

  • Eg. ePassports.

Loyalty cards.

Gildas Avoine Privacy Challenges in RFID 7

slide-8
SLIDE 8

Tag Characteristics

cost power frequency communication standard calculation storage

active passive LF HF UHF meters dm cm UID 1 KB 40 KB no pwd sym crypto asym crypto EPC ISO14443 ISO15693 10 cents 50 cents euros

Gildas Avoine Privacy Challenges in RFID 8

slide-9
SLIDE 9

Security Specificities

Low capabilities. Wireless. Ubiquity. Fast authentication.

Gildas Avoine Privacy Challenges in RFID 9

slide-10
SLIDE 10

Security Threats Classification

Security.

  • Impersonation.
  • Denial of service.

Privacy.

  • Information leakage.
  • Malicious traceability.

Gildas Avoine Privacy Challenges in RFID 10

slide-11
SLIDE 11

Research fields about RFID Privacy

http://www.avoine.net/rfid/

Privacy models. Untraceable (lightweight) protocols. Untraceable (scalable) protocols. Counterfeiting. Grouping Proof. Ownership transfer. Applications: ePassport, pacemakers, etc.

Gildas Avoine Privacy Challenges in RFID 11

slide-12
SLIDE 12

PRIVACY: INFORMATION LEAKAGE

Background about RFID Privacy: Information Leakage Privacy: Malicious Traceability Is Privacy a Research Challenge?

slide-13
SLIDE 13

Importance of Avoiding Traceability

Other Technologies

Differences between RFID and the other technologies eg. video, credit cards, GSM, Bluetooth.

  • Tags cannot be switched-off.
  • Passive tags answer without the agreement of their bearers.
  • Easy to analyze the logs of the readers.
  • Increasing of the communication range.
  • Tags can be almost invisible.

Gildas Avoine Privacy Challenges in RFID 13

slide-14
SLIDE 14

Importance of Avoiding Traceability

Liberty Rights Organizations

Even if you do not think that privacy is important, some people think so and they are rather influential (CASPIAN, FoeBud,...).

Gildas Avoine Privacy Challenges in RFID 14

slide-15
SLIDE 15

European Commission

Member States should ensure that operators (...) conduct an assessment of the implications of the application implementation for the protection of personal data and privacy, including whether the application could be used to monitor an individual. Because of its potential to be both ubiquitous and practically invisible, particular attention to privacy and data protection issues is required in the deployment of RFID. Consequently, privacy and information security features should be built into RFID applications before their widespread use (principle of security and privacy by design). [Viviane Reding, EC Recommendation, 12.5.2009]

Gildas Avoine Privacy Challenges in RFID 15

slide-16
SLIDE 16

Importance of Avoiding Traceability

Anne Cavioukan

“Privacy and Security must be built in from the outset, at the design Stage”. [Privacy Guidelines for RFID Information Systems, 2006, Anne Cavioukan, Information and Privacy Commissioner of Ontario]

Gildas Avoine Privacy Challenges in RFID 16

slide-17
SLIDE 17

Importance of Avoiding Traceability

Palliative Solutions

Kill-command (Eg.: EPC Gen 2 requires a 32-bit kill command.) Faraday cages. Blocker tags. Bill of Rights. Removable antenna.

  • US Patent 7283035 - RF data communications device with

selectively removable antenna portion and method.

Tag must be pressed (SmartCode Corp.).

www.idstronghold.com

Gildas Avoine Privacy Challenges in RFID 17

slide-18
SLIDE 18

Classification

Information meaningful by itself. Information meaningful with the database.

Gildas Avoine Privacy Challenges in RFID 18

slide-19
SLIDE 19

Information Meaningful by Itself

Typical Examples

Information leakage appears when the data sent by the tag reveals information intrinsic to the marked object or the holder

  • f the object.
  • Tagged books in libraries.
  • Tagged pharmaceutical products, as advocated be the US. Food

and Drug Administration.

  • E-documents (passports, ID cards, etc.).
  • Loyalty cards, Public transportation passes.

Gildas Avoine Privacy Challenges in RFID 19

slide-20
SLIDE 20

Information Meaningful by Itself

Ari Juels’s Famous Picture

500 Euros in wallet Serial numbers: 597387,389473… Wig model #4456 (cheap polyester) 30 items

  • f lingerie

Das Kapital and Communist-party handbook Replacement hip medical part #459382

Credit: Ari Juels

Gildas Avoine Privacy Challenges in RFID 20

slide-21
SLIDE 21

Information Meaningful by Itself

Public Transportation: MOBIB Card in Brussels

MOBIB card (RFID) launched in Brussels in 2008. Before getting in a subway, bus or tram, customers are required to show up their MOBIB card in front of a validator. MOBIB is Calypso technology. MOBIB cards are rather powerful RFID tags that embed cryptographic mechanisms to avoid impersonation or cloning. Personal data are stored in the clear in the card: name, birthdate, zipcode. Information about 3 last validations: date, time, bus line, bus stop, subway station, ...

Gildas Avoine Privacy Challenges in RFID 21

slide-22
SLIDE 22

Information Meaningful with a Database

Ari Juels’s Famous Picture

55542390 41126751 09840921 54872164 93479122

Credit: Inspired by Ari Juels

Gildas Avoine Privacy Challenges in RFID 22

slide-23
SLIDE 23

Information Meaningful with a Database

ABIEC Information Leakage

Gildas Avoine Privacy Challenges in RFID 23

slide-24
SLIDE 24

PRIVACY: MALICIOUS TRACEABILITY

Background about RFID Privacy: Information Leakage Privacy: Malicious Traceability Is Privacy a Research Challenge?

slide-25
SLIDE 25

Privacy: Malicious Traceability

Informal Definition

An adversary should not be able to track a tag holder, ie. he should not be able to link two interactions tag/reader.

  • Eg. tracking of employees by the boss, tracking of children in an

amusement park, tracking of military troops, etc.

Gildas Avoine Privacy Challenges in RFID 25

slide-26
SLIDE 26

Privacy: Malicious Traceability

Tracking through the Layers

The main concepts of cryptography, i.e. confidentiality, integrity, and authentication, are treated without any practical considerations. If one of these properties is theoretically ensured, it remains ensured in practice whatever the layer we choose to implement the protocol. Privacy needs to be ensured at each layer: All efforts to prevent traceability in the application layer may be useless if no care is taken at the lower layers.

Gildas Avoine Privacy Challenges in RFID 26

slide-27
SLIDE 27

Privacy: Malicious Traceability

Traceability Through the Layers

Application Layer Communication Layer Physical Layer Authentication / Identification. Collision-avoidance. Radio fingerprints. Diversity of standards.

Gildas Avoine Privacy Challenges in RFID 27

slide-28
SLIDE 28

Privacy: Malicious Traceability

Application Layer

Reader (list of keys) Tag (key k) r − − − − − − − − − − − − − − − → ID, Ek(r, r ′) ← − − − − − − − − − − − − − − −

This protocol is not privacy-friendly because the ID is revealed. CR protocols avoiding malicious traceability do not scale well.

  • Authenticating one tag requires O(n) operations.

Gildas Avoine Privacy Challenges in RFID 28

slide-29
SLIDE 29

Privacy: Malicious Traceability

Summary

In the physical layer.

  • Hard to avoid malicious traceability, but tracking one tag is far

from being easy in practice.

In the communication layer.

  • Malicious traceability is usually do-able in practice.
  • Can be avoided if a cryptographically-secure PRNG is used.

In the application layer.

  • Malicious traceability can be avoided but challenge-response

protocols do not scale well.

Gildas Avoine Privacy Challenges in RFID 29

slide-30
SLIDE 30

IS PRIVACY A RESEARCH CHALLENGE?

Background about RFID Privacy: Information Leakage Privacy: Malicious Traceability Is Privacy a Research Challenge?

slide-31
SLIDE 31

Research Challenge

There are clearly privacy issues in RFID systems Is privacy still a meaningful concept nowadays? We already lost the control of our privacy. People no longer care about privacy (vote...) There is no business model behind privacy. We could have privacy if it was free. Privacy never comes for free. All existing works on RFID privacy are practically useless. Consider privacy with a larger view. Do not try to get the best. Find some metrics to privacy. Enforce privacy using certifications.

Gildas Avoine Privacy Challenges in RFID 31

slide-32
SLIDE 32

Conclusion

Going Further

http://sites.uclouvain.be/security/ gildas.avoine@uclouvain.be

Gildas Avoine Privacy Challenges in RFID 32