Security and Reliability of Automated Waste Registration in The - - PowerPoint PPT Presentation

security and reliability of automated waste registration
SMART_READER_LITE
LIVE PREVIEW

Security and Reliability of Automated Waste Registration in The - - PowerPoint PPT Presentation

Introduction Theory Results Conclusion Security and Reliability of Automated Waste Registration in The Netherlands Dick Visser Thijs Kinkhorst February 2008 Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste


slide-1
SLIDE 1

Introduction Theory Results Conclusion

Security and Reliability of Automated Waste Registration in The Netherlands

Dick Visser Thijs Kinkhorst February 2008

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-2
SLIDE 2

Introduction Theory Results Conclusion

Diftar: differentiated tariffs

◮ Goal: reduce amount of waste

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-3
SLIDE 3

Introduction Theory Results Conclusion

Diftar: differentiated tariffs

◮ Goal: reduce amount of waste ◮ Solution: households pay per amount of waste

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-4
SLIDE 4

Introduction Theory Results Conclusion

Diftar: differentiated tariffs

◮ Goal: reduce amount of waste ◮ Solution: households pay per amount of waste

◮ Per kilogram waste ◮ Per collected container Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-5
SLIDE 5

Introduction Theory Results Conclusion

Diftar: differentiated tariffs

◮ Goal: reduce amount of waste ◮ Solution: households pay per amount of waste

◮ Per kilogram waste ◮ Per collected container

◮ Waste Registration!

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-6
SLIDE 6

Introduction Theory Results Conclusion

Waste Registration Overview

◮ Personal containers ◮ Shared containers ◮ Data processing centre

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-7
SLIDE 7

Introduction Theory Results Conclusion

Problem

◮ Many municipalities have an automated registration system

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-8
SLIDE 8

Introduction Theory Results Conclusion

Problem

◮ Many municipalities have an automated registration system ◮ Systems use rfid, gprs, wifi...

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-9
SLIDE 9

Introduction Theory Results Conclusion

Problem

◮ Many municipalities have an automated registration system ◮ Systems use rfid, gprs, wifi... ◮ Not much known about security and reliability of these

systems Our research questions:

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-10
SLIDE 10

Introduction Theory Results Conclusion

Problem

◮ Many municipalities have an automated registration system ◮ Systems use rfid, gprs, wifi... ◮ Not much known about security and reliability of these

systems Our research questions:

◮ What are the requirements for a good automated waste

registration system for domestic waste collection?

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-11
SLIDE 11

Introduction Theory Results Conclusion

Problem

◮ Many municipalities have an automated registration system ◮ Systems use rfid, gprs, wifi... ◮ Not much known about security and reliability of these

systems Our research questions:

◮ What are the requirements for a good automated waste

registration system for domestic waste collection?

◮ Which systems are available and do they meet these

requirements?

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-12
SLIDE 12

Introduction Theory Results Conclusion Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-13
SLIDE 13

Introduction Theory Results Conclusion

Method

◮ No known prior research

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-14
SLIDE 14

Introduction Theory Results Conclusion

Method

◮ No known prior research ◮ Theory of a secure system

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-15
SLIDE 15

Introduction Theory Results Conclusion

Method

◮ No known prior research ◮ Theory of a secure system ◮ Defining tests

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-16
SLIDE 16

Introduction Theory Results Conclusion

Method

◮ No known prior research ◮ Theory of a secure system ◮ Defining tests ◮ Field work around the country

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-17
SLIDE 17

Introduction Theory Results Conclusion

Field work

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-18
SLIDE 18

Introduction Theory Results Conclusion

CIA Triad

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-19
SLIDE 19

Introduction Theory Results Conclusion

Implementing CIA

Techniques:

◮ Authentication

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-20
SLIDE 20

Introduction Theory Results Conclusion

Implementing CIA

Techniques:

◮ Authentication ◮ Authorisation

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-21
SLIDE 21

Introduction Theory Results Conclusion

Implementing CIA

Techniques:

◮ Authentication ◮ Authorisation ◮ Cryptography

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-22
SLIDE 22

Introduction Theory Results Conclusion

Implementing CIA

Techniques:

◮ Authentication ◮ Authorisation ◮ Cryptography ◮ Logging and monitoring

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-23
SLIDE 23

Introduction Theory Results Conclusion

Implementing CIA

Techniques:

◮ Authentication ◮ Authorisation ◮ Cryptography ◮ Logging and monitoring ◮ Physical security

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-24
SLIDE 24

Introduction Theory Results Conclusion

Implementing CIA

Techniques:

◮ Authentication ◮ Authorisation ◮ Cryptography ◮ Logging and monitoring ◮ Physical security ◮ Rate limiting

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-25
SLIDE 25

Introduction Theory Results Conclusion

Implementing CIA

Techniques:

◮ Authentication ◮ Authorisation ◮ Cryptography ◮ Logging and monitoring ◮ Physical security ◮ Rate limiting

This was developed into specific tests, for example: is an rfid container ID clonable?

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-26
SLIDE 26

Introduction Theory Results Conclusion

Personal Containers

Oz Kmpn Mpl Hgz Ap diftar yes yes no yes yes reading requires auth? ? no ? ? ? tagless bin emptied? yes no no no no unknown tag emptied? yes yes no yes no can blacklist tags? yes yes yes yes yes is tag crypted? ? ? ? ? ? logging of events? yes yes yes yes yes rate limiting? no no no no yes

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-27
SLIDE 27

Introduction Theory Results Conclusion

Shared Containers

Hfd Kmpn Mpl Hgz Ap diftar? no yes no yes yes auth to read tag? no no no no ? unknown tag works? yes no no no no can blacklist tag? no yes yes yes yes crypted tag? no yes yes yes yes rate limiting? no no no no no disrupt power? yes no yes no/yes no disrupt comms?

  • no

no yes no DoS? no yes no yes no

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-28
SLIDE 28

Introduction Theory Results Conclusion

Data Processing Centre

Oz Kmpn Mpl Hgz Ap diftar? yes yes no yes yes requires read auth? yes yes yes yes yes shared requires read auth? yes yes yes yes yes can see user data? no no no no no comm user crypted?

  • no

no

  • comm shared crypted?
  • ?

no ? ? media crypted? no no no no no requires write auth? yes yes yes yes yes data signed? no no no no ? uses logging? yes yes yes yes ? can be DoSsed? no no yes no no

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-29
SLIDE 29

Introduction Theory Results Conclusion

Highlights

Some highlights:

◮ We have trivially cloned most shared container passes.

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-30
SLIDE 30

Introduction Theory Results Conclusion

Highlights

Some highlights:

◮ We have trivially cloned most shared container passes. ◮ In Hoofddorp the shared containers can be opened by any

EM4x02 card.

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-31
SLIDE 31

Introduction Theory Results Conclusion

Highlights

Some highlights:

◮ We have trivially cloned most shared container passes. ◮ In Hoofddorp the shared containers can be opened by any

EM4x02 card.

◮ In Kampen the tag type can prevent readout with a password,

but this feature is unused.

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-32
SLIDE 32

Introduction Theory Results Conclusion

Highlights

Some highlights:

◮ We have trivially cloned most shared container passes. ◮ In Hoofddorp the shared containers can be opened by any

EM4x02 card.

◮ In Kampen the tag type can prevent readout with a password,

but this feature is unused.

◮ We couldn’t read the tags in Oostzaan because they predate

rfid standards – security through obsoleteness?

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-33
SLIDE 33

Introduction Theory Results Conclusion

Highlights

Some highlights:

◮ We have trivially cloned most shared container passes. ◮ In Hoofddorp the shared containers can be opened by any

EM4x02 card.

◮ In Kampen the tag type can prevent readout with a password,

but this feature is unused.

◮ We couldn’t read the tags in Oostzaan because they predate

rfid standards – security through obsoleteness?

◮ Virtually no encryption is used in any of the communications,

e.g. plain http for worldwide backend access.

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-34
SLIDE 34

Introduction Theory Results Conclusion

https?

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-35
SLIDE 35

Introduction Theory Results Conclusion

Conclusion

Our most important observations:

  • 1. RFID tags must be better secured

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-36
SLIDE 36

Introduction Theory Results Conclusion

Conclusion

Our most important observations:

  • 1. RFID tags must be better secured
  • 2. Encryption can enhance security of current systems

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-37
SLIDE 37

Introduction Theory Results Conclusion

Conclusion

Our most important observations:

  • 1. RFID tags must be better secured
  • 2. Encryption can enhance security of current systems
  • 3. Human monitoring and control is important

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-38
SLIDE 38

Introduction Theory Results Conclusion

Conclusion

Our most important observations:

  • 1. RFID tags must be better secured
  • 2. Encryption can enhance security of current systems
  • 3. Human monitoring and control is important
  • 4. Not much security awareness among municipalities

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-39
SLIDE 39

Introduction Theory Results Conclusion

Conclusion

Our most important observations:

  • 1. RFID tags must be better secured
  • 2. Encryption can enhance security of current systems
  • 3. Human monitoring and control is important
  • 4. Not much security awareness among municipalities
  • 5. Many ideas for future research

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration

slide-40
SLIDE 40

Introduction Theory Results Conclusion

Questions?

dvisser@os3.nl Dick Visser tkinkhorst@os3.nl Thijs Kinkhorst

Dick Visser, Thijs Kinkhorst Security and Reliability of Automated Waste Registration