Relay Attacks and Distance Bounding Protocols in RFID Environments
- Prof. Gildas Avoine
Relay Attacks and Distance Bounding Protocols in RFID Environments - - PowerPoint PPT Presentation
Relay Attacks and Distance Bounding Protocols in RFID Environments Prof. Gildas Avoine Universit e catholique de Louvain, Belgium Information Security Group SUMMARY RFID Background Relay Attacks Distance Bounding Protocols Conclusion
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 4/27
www.aeroid.co.uk www.rfid-library.com www.flickr.com www.safetzone.com
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 5/27
Credit: G. Avoine Credit: G. Avoine www.carthiefstoppers.com www.brusselnieuws.be blogs.e-rockford.com
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 6/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 7/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 7/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 7/27
Na
Ek(Na,Nb)
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 9/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 10/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 10/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 10/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 10/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 10/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 10/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 11/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 11/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 11/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 11/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 12/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 12/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 13/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 15/27
Reader Tag
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 15/27
Reader Tag
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 15/27
Adversary Reader Tag Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 16/27
Adversary Reader Tag Reader Tag Adversary Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 16/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 17/27
Adversary Reader Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 17/27
Adversary Reader Adversary Tag Reader Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 17/27
Adversary Reader Adversary Tag Reader Tag Reader Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 17/27
Adversary Reader Adversary Tag Reader Tag Reader Reader Adversary Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 17/27
Adversary Reader Adversary Tag Reader Tag Reader Reader Adversary Tag Reader Adversary Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 17/27
Tag Reader Neighborhood Computation
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 18/27
Reader Neighborhood computation Accelerated Tag
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 18/27
Reader Tag (secret K) (secret K) Pick a random Na Pick a random Nb
Na
− − − − − − − →
Nb
← − − − − − − − h(K, Na, Nb) =
= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock
Ci
− − − − − − − → Ri = v0
i , if Ci = 0
v1
i , if Ci = 1
Stop Clock
Ri
← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 19/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 20/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 20/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 21/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 21/27
Reader Tag (secret K) (secret K) Pick a random Na Pick a random Nb
Na
− − − − − − − →
Nb
← − − − − − − − h(K, Na, Nb) =
= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock
Ci
− − − − − − − → Ri = v0
i , if Ci = 0
v1
i , if Ci = 1
Stop Clock
Ri
← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 22/27
Reader Tag (secret K) (secret K) Pick a random Na Pick a random Nb
Na
− − − − − − − →
Nb
← − − − − − − − h(K, Na, Nb) =
= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock
Ci
− − − − − − − → Ri = v0
i , if Ci = 0
v1
i , if Ci = 1
Stop Clock
Ri
← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 22/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 23/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 23/27
White−box model Terrorist fraud Terrorist fraud Mafia fraud Mafia fraud Distance fraud Distance fraud Black−box model
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 23/27
White−box model Terrorist fraud Terrorist fraud Mafia fraud Mafia fraud Distance fraud Distance fraud Black−box model
1e-16 1e-14 1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1 1 10 100 1000 10000 100000 1e+06 Adversary success probability p: Number of runs Register length: n=20 n=40 n=60 n=80 n=128
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 23/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 25/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 26/27
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 27/27