rfid and ticketing application
play

RFID and ticketing application Who? C edric Lauradoux - PowerPoint PPT Presentation

RFID and ticketing application Who? C edric Lauradoux EPL/INGI/GSI When? January 22, 2009 Outline RFID primer Technology Information leakage Malicious tracability Denial of service Relay attacks Ticketing primer


  1. RFID and ticketing application Who? C´ edric Lauradoux EPL/INGI/GSI When? January 22, 2009

  2. Outline • RFID primer ◮ Technology ◮ Information leakage ◮ Malicious tracability ◮ Denial of service ◮ Relay attacks • Ticketing primer ◮ Problem ◮ Attacks • when RFID meet ticketing. . .

  3. Radio Frequency IDentification

  4. Radio Frequency IDentification The big Napoleon Distance Frequency meters 2.4Ghz 900Mhz 13.56Mhz centimeters 124Khz ISO 14443 EPC Gen 2 Norms Tamper resistance no yes ISO 15963 128 xor 0.20$ symmetric 0.80$ 1024 asymmetric Memory 3$ Crypto Cost

  5. Radio Frequency IDentification Identification Definition The result of an identification protocol is the identity claimed by the queried RFID tag. Bob the door Alice the tag Who are you ? Alice

  6. Radio Frequency IDentification Authentification Definition The result of an authentification protocol is the genuine identity of a(the) participant(s). Bob the door Alice the tag n 1 f ( k , n 1 , Id ) ( k , Id ) ( k , Id ) In brief: Authentification = Identity + Proof.

  7. Frequency band • 125–134 kHz (LF): Pet identification, livestock tracking. . . • 13.553–13.567 MHz (HF): Smartcards, libraries. . . • 860–960 MHz (UHF): Supply chain tracking. . . • 2.4000–2.4835 GHz (UHF): Highway toll, vehicle fleet. . .

  8. Norms lost in translation ?? ISO Identification protocols: 18046 17365 11785 17366 24710 18185 24721 15418 19762 19789 18000 15693 15459 17368 14443 10536 15963 17367 18047 11784 15961

  9. Radio Frequency IDentification Beijing Olympic Games First event of this scale to use RFID: (2 24 ) • 16 millions RFID tags used Tags usage: • ticket anti-counterfeiting system • food production and delivery monitoring • subway and hotels access control Next event, the Universal Exhibition (Shanghai 2010): (2 26 ) • 70 millions tickets

  10. Radio Frequency IDentification Beijing Olympic Games Tag technology: • 13.56 Mhz range 1-10cm; • ISO 14443B; • No cryptographic capabilities; • TMC products THR1064. Reader technology: • CPLD centric (reconfigurable); • Software Defined Radio; • PDA interface.

  11. Tag RF−interface Collision Interface Authen. ALU Memory

  12. RFID and security • Information leakage Okay, you got us. . . crypto what ? • Malicious tracability We don’t care ! • Relay attacks What the hell is that ? • Denial of service . . . . . . ?

  13. Malicious traceability Definition An adversary should not be able to track the tag holder: impossibility to correlate the tag interactions with the context of the usage. Bob the door Alice the tag n 1 ( k , Id ) f ( k , n 1 , Id ) ( k , Id ) n 1 f ( k , n 1 , Id ) n 1 f ( k , n 1 , Id ) Got you!

  14. Malicious traceability Tag architecture ALU Id RF−interface Collision Memory Interface RNG f k

  15. Malicious traceability

  16. Malicious traceability Data analysis in forensic t 1 , p 1 , Id 1 t 1 , p 2 , Id 1 F 2 n E E c 1 ∈ F 2 m , m ≤ n c 2 ∈ F 2 m , m ≤ n Choices for E : • plaintext, transposition differential analysis • adaptative compression ?? • strict avalanche criteria functions ?? • cryptography side-channel attacks

  17. Tonight word: Definition Anonymity – [. . . ] the term typically refers to a person, and often means that the personal identity, or personally identifiable information of that person is not known. More strictly, and in reference to an arbitrary element [. . . ], within a well-defined set (called the ”anonymity set”), ”anonymity” of that element refers to the property of that element of not being identifiable within this set. If it is not identifiable, then the element is said to be ”anonymous”. WIKIPEDIA Definition Anonymity – we don’t put your data into the database. STIB, RATP. . .

  18. Relay attacks Chess player problem 1. d4 1. d4 1. .. Cf6 1. .. Cf6 Rusé ce Jean−Pierre !

  19. Relay attacks in RFID. Bob the door Alice the tag n 1 f ( k , n 1 , Id ) ( k , Id ) ( k , Id ) Bob the door n 1 ( k , Id ) Alice the tag f ( k , n 1 , Id ) ( k , Id )

  20. Relay attacks Solution Round Trip Time ? ( n 1 ◦ t 1 ) F ( n 1 ◦ t 1 , k , Id ) Verification Problem • reception t 2 • σ ? • f − 1 ( n 1 ◦ t 1 , k , Id ) • BCET • ok if δ t < σ • WCET

  21. Relay attacks More headaches ! • Attacker model: ◮ freeze the time ◮ speed the time ◮ he is all-mighty ! • On tag solutions: ◮ don’t dream no clock ! ◮ any computation is a potential noise for the result.

  22. Relay attacks 3 types of attacks • Mafia fraud: the basic attack. • Distance fraud: the prover cheats by sending early answer. • Terrorism fraud: the prover colludes with the attacker without revealing its secret key. The solutions are the distance-bounding protocols.

  23. Denial of services DoS is important in a competition context: • RF Jammer: secure spread spectrum; • Collision Jammer: improved algorithms; • ElectroMagnetic Pulse: no possible solution. Almost unvoidable attacks: • Important to know your enemy; • Critical to know what can do your commpetitor to ternish your reputation; • Fun.

  24. Ticketing applications An access control problem

  25. Ticketing problem The players Designer of the system A few constraints: money, time... Collusion with the thief to increase profit The owner Don’t want to know any complex stuffs Responsible for the customers line The steward Hold the ticket (don’t expect anything else) Don’t like to wait (short line) The customer Smart: through time find always all the weaknesses Unlimited evilness Collusion with the owner The thief

  26. Ticketing problem The rules control check collusion check ?? collusion sell Specific attacks on ticketing systems: • Counterfeit one for many; • Pass-back a few for many; • Illegal multiple sales many for many; • Black market money for money.

  27. Counterfeit control sell 63 check 63 check 63 counterfeit 63

  28. Counterfeit: ticket like bills ? . . . or can we take advantage of money anti-counterfeiting system Paper anti-counterfeiting system: • special paper; • special ink; • holography; Hard to check !

  29. Pass-back t 1 t 2 t 3 t 4

  30. Pass-Back t 1 , t 2 , t 3 , t 4

  31. Pass-back t 1 t 2 t 3 t 4

  32. Pass-back

  33. Pass-back Coupon Disavantages: • one shot; • not resistant to collusion;

  34. Black market and illegal multiple sales I am not Santa Claus !

  35. RFID and ticketing I have a dream of an RFID ticketing solutions that is: • efficient; • secure; • cheap (no crypto on tag); • compatible; • simple (this is a dream); I am free to forget: • privacy; • relay; • other complex stuffs;

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend