rfid traceability a multilayer problem
play

RFID Traceability: A Multilayer Problem Gildas Avoine and Philippe - PowerPoint PPT Presentation

Introduction and Motivation Financial Cryptography 2005 Relationship Between Traceability and Communication Model Focus on the Communication Layer RFID Traceability: A Multilayer Problem Gildas Avoine and Philippe Oechslin EPFL, Lausanne,


  1. Introduction and Motivation Financial Cryptography 2005 Relationship Between Traceability and Communication Model Focus on the Communication Layer RFID Traceability: A Multilayer Problem Gildas Avoine and Philippe Oechslin EPFL, Lausanne, Switzerland ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  2. Introduction and Motivation Outline Relationship Between Traceability and Communication Model Focus on the Communication Layer Introduction and Motivation Relationship Between Traceability and Communication Model Focus on the Communication Layer RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  3. Introduction and Motivation Relationship Between Traceability and Communication Model Focus on the Communication Layer Introduction and Motivation RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  4. Introduction and Motivation Goals Relationship Between Traceability and Communication Model Focus on the Communication Layer Radio Frequency Identification Identify objects remotely by embedding in these objects tiny devices (tags) capable of transmitting data. RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  5. Introduction and Motivation RFID Systems Relationship Between Traceability and Communication Model Focus on the Communication Layer tag reader tag database tag reader tag RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  6. Introduction and Motivation Emergence of the RFID Technology Relationship Between Traceability and Communication Model Focus on the Communication Layer The RFID technology is not new, e.g., contactless smartcards were already RFID devices (public transport, tollways). The boom which RFID technology is enjoying today relies essen- tially on the willingness to develop small and cheap RFID tags. RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  7. Introduction and Motivation RFID Characteristics Relationship Between Traceability and Communication Model Focus on the Communication Layer Extremely limited storage and computation capabilities Not tamper-resistant No battery Reader-to-Tag channel: up to 100 meters Tag-to-Reader channel: up to a few meters RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  8. Introduction and Motivation Applications Relationship Between Traceability and Communication Model Focus on the Communication Layer RFID tags could replace the bar-codes in the near future and could open the door to new applications. Management of stocks (Wal-Mart, Gillette, etc.) Speed up the checkouts in the shops Libraries (Santa Clara Library, University of Nevada, etc.) Recycling Pets identification Anti-counterfeiting Sensor networks (Michelin, etc.) Localization of people RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  9. Introduction and Motivation Threats on the Tag’s Bearers Relationship Between Traceability and Communication Model Focus on the Communication Layer Privacy � ❅ � ✠ ❘ ❅ Information Traceability leakage Information leakage: The tag reveals some information related to the object holder. Traceability: An adversary could track the tag, and therefore its bearer. RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  10. Introduction and Motivation Examples of traceability Relationship Between Traceability and Communication Model Focus on the Communication Layer Tracking of employees by the boss, tracking of children in an amusement park, tracking of military troops, etc. Several companies suffer from boycott campaigns led by powerful organizations. Easier to track people using the RFID technology than other technologies (e.g. video, credit cards, GSM) because tags can- not be switched-off, tags can be almost invisible, easy to an- alyze the logs of the readers (e.g. data mining), increasing of the communication distance. RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  11. Introduction and Motivation Solutions Relationship Between Traceability and Communication Model Focus on the Communication Layer Physical solutions e.g. Faraday cages, blocker tags, kill the tag Software solutions based on Cryptographic protocols How designing an RFID protocol such that an autho- rized party only is able to identify a tag while an ad- versary is not able to track it? RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  12. Introduction and Motivation Relationship Between Traceability and Communication Model Focus on the Communication Layer Relationship Between Traceability and Communication Model RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  13. Introduction and Motivation Privacy and Communication Model Relationship Between Traceability and Communication Model Focus on the Communication Layer application presentation application application session transport transport network internet communication data link physical physical physical OSI TCP / IP RFID RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  14. Introduction and Motivation Privacy vs Classical Properties Relationship Between Traceability and Communication Model Focus on the Communication Layer The main concepts of cryptography, i.e, confidentiality, integrity, and authentication, are treated without any practical considerations. If one of these properties is theoretically ensured, it remains ensured in practice whatever the layer we choose to implement the protocol. Privacy needs to be ensured at each layer. All efforts to prevent traceability in the application layer may be useless if no care is taken at the lower layers. RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  15. Introduction and Motivation RFID Model Relationship Between Traceability and Communication Model Focus on the Communication Layer Application layer: The identification protocol itself. Communication layer: The medium access protocol (Collision avoidance). Physical layer: Air interface (frequency, modulation, etc.) RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  16. Introduction and Motivation Diversity of Standards Relationship Between Traceability and Communication Model Focus on the Communication Layer Signals from tags using different standards are easy to distinguish. A problem arises when we consider sets of tags rather than a single tag. If several standards are in use, each person in a few years may have a set of tags with a characteristic mix of standards which may allow a person to be traced. RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  17. Introduction and Motivation Radio Fingerprints Relationship Between Traceability and Communication Model Focus on the Communication Layer Even if the tags follow the same standard, there will be several manufacturers in the market and their tags will have different radio fingerprints. It will thus be possible to trace a person by a characteristic mix of tags from different manufacturers. Preventing traceability through radio fingerprints seems quite diffi- cult because there is no benefit for the manufacturers in producing tags that use exactly the same technology, producing the same radio fingerprint. RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  18. Introduction and Motivation RFID Model Relationship Between Traceability and Communication Model Focus on the Communication Layer Application layer: The identification protocol itself. Communication layer: The medium access protocol (Collision avoidance). Physical layer: Air interface (frequency, modulation, etc.) → The physical signals exchanged between a tag and a reader can allow an adversary to recognize a tag or a set of tags. Threats due to the diversity of standards Threats due to radio-fingerprints → Conclusion quite pessimistic but such attacks require strong means. RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  19. Introduction and Motivation Relationship Between Traceability and Communication Model Focus on the Communication Layer Focus on the Communication Layer RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  20. Introduction and Motivation Collision Avoidance Relationship Between Traceability and Communication Model Focus on the Communication Layer Are there any questions? David Moti Andrew Noise Ari Jacques But, with RFID tags... The computational power of the tags is very limited and they are unable to communicate with each other. The reader must deal with the collision avoidance itself. RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

  21. Introduction and Motivation Standards Relationship Between Traceability and Communication Model Focus on the Communication Layer Collision avoidance protocols are often (non-open source) proprietary algorithms. Standards appear: ISO and EPC. Two large families: deterministic protocols and probabilistic protocols. Potential threats: lack of randomness and uncompleted ses- sions. RFID Traceability: A Multilayer Problem http://lasecwww.epfl.ch/ ∼ gavoine/rfid/

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend