Relay Attacks and Distance Bounding Protocols in RFID Environments
- Prof. Gildas Avoine
Relay Attacks and Distance Bounding Protocols in RFID Environments - - PowerPoint PPT Presentation
Relay Attacks and Distance Bounding Protocols in RFID Environments Prof. Gildas Avoine Universit e catholique de Louvain, Belgium Information Security Group SUMMARY RFID Background Relay Attacks Countermeasures and Evolved Frauds
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 4
www.aeroid.co.uk www.rfid-library.com www.flickr.com www.safetzone.com
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 5
Credit: G. Avoine Credit: G. Avoine www.carthiefstoppers.com www.brusselnieuws.be www.bajabeach.es blogs.e-rockford.com
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 6
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 7
Na
Ek(Na,Nb)
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 9
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 10
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 11
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 12
Reader Tag
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 14
Adversary Reader Tag Reader Tag Adversary Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 15
Adversary Reader Adversary Tag Reader Tag Reader Reader Adversary Tag Reader Adversary Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 16
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 17
Reader Neighborhood computation Accelerated Tag
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 18
Reader Tag (secret K) (secret K) Pick a random Na
Na
− − − − − − − → h(K, Na) =
= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock
Ci
− − − − − − − → Ri = v0
i , if Ci = 0
v1
i , if Ci = 1
Stop Clock
Ri
← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 19
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 20
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 21
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 22
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 24
Reader Tag (secret K) (secret K) Pick a random Na
Na
− − − − − − − → h(K, Na) =
= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock
Ci
− − − − − − − → Ri = v0
i , if Ci = 0
v1
i , if Ci = 1
Stop Clock
Ri
← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 26
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 27
Reader Tag (secret K) (secret K) Pick a random Na Pick a random Nb
Na
− − − − − − − →
Nb
← − − − − − − − h(K, Na, Nb) =
= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock
Ci
− − − − − − − → Ri = v0
i , if Ci = 0
v1
i , if Ci = 1
Stop Clock
Ri
← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 28
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 29
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 31
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 32
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 33
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 34
1e-16 1e-14 1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1 1 10 100 1000 10000 100000 1e+06 Adversary success probability p: Number of runs Register length: n=20 n=40 n=60 n=80 n=128 Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 35
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 36
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 38
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 39
Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 40