Lightweight Cryptography for RFID Systems

Similar documents
Wireless# Guide to Wireless Communications. Objectives

RFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas

RFID Overview. Outline. Definition. Barcode Replacement. Reading Tags

SL3 ICS General description UCODE EPC G2

XRAG bit UHF, EPCglobal Class1 Generation2 and ISO C, contactless memory chip with user memory. Features

A Secured Mutual Authentication Protocol For RFID System

Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems

Plan, outline / Wireless Networks and Applications Lecture 23: RFID and NFC. How Does It Work? What is RFID? Page 1

RADIO FREQUENCY IDENTIFICATION (RFID) Anush Kumar,Chandan Kumar Department of ECE Dhronacharya Engineering College,Gurgaon,India

RFID Technologies. By Francisco J. Carabez

RFID and Privacy Impact Assessment (PIA)

Specification for RFID Air Interface. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Conformance Requirements Version 1.0.

RAIN Radio Protocol. December 2015

RFID TECHNOLOGY FOR IDENTIFICATION, SECURITY AND DOCUMENT HANDLING IN LIBRARY

RFID FAQs, not Fiction

Privacy Preservation and Mutual Authentication in RFID Systems

Privacy Challenges in RFID

EPC Standards: EPC Tag Classes: EPC Class Type Features Tag Type

Warehouse Automation using RFID Technology

Radio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches

Fault Tolerance Evaluation of RFID Tags

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks

Low-cost RFID identification variation

Security challenges for RFID key applications

EPC Primer. Erik Sundermann HUG Meeting - Paris 20th Sept 2006

Today s Lecture - RFID. Part I: Technology and applications. Part II: Security and privacy aspects.

About The FILE Group of Companies

RFID (Radio Frequency IDentification)

Security and Privacy Concerns about the RFID layer of EPC Gen2 Networks

Sridhar Iyer. IIT Bombay

RFID OVERVIEW. by ADC Technologies Group. Introduction to Radio Frequency Identification (RFID) Certified RFID Provider

A proposed formula for comparing kill password effectiveness in single password RFID systems

Fingerprinting Radio Frequency Identification Tags Using Timing Characteristics

Avonwood Developments Ltd. Tel: +44 (0) Fax: +44 (0) Web:

IEEE RFID 2012 Tutorials and Workshops

RFID Based Event/Activity Management System

Design of the RFID for storage of biological information

Library Automation using RFID Technology

Imagine the Power of Knowing. An introduction to our Company

A Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007

Managing the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER

abhisam RFID Discover the power of e-learning!

EM / EPC TM Class-1 Generation-2 (Gen2) RFID IC EM MICROELECTRONIC - MARIN SA. Description. Features. Typical Operating Configuration

RFID Technology : Introduction and Application

ISO/IEC SC31 & GS1/EPCglobal. ETSI, 3 December 2007 Henri Barthel, GS1 Global Office

Dimitar Popov Zeina Muallem

RFID Basics. Three primary frequency bands have been allocated for RFID use.

IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD

EPCglobal Overview Delivering value through global standards

RFID AS A TOOL FOR SAFETY, SECURITY, PRIVACY AND CONVENIENCE FOR INTELLIGENT TRANSPORT SYSTEMS

Module 7 Evaluation and Selection

White Paper. A B C s o f R F I D : U N D E R S T A N D I N G

SL2S1412; SL2S1512; SL2S1612

AN APPLICATION OF RFID IN MONITORING AGRICULTURAL MATERIAL PRODUCTS

INNOV-6: "RFID Vapor, Fiction and Truths"

Ref:

Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development

SIMATIC RF630L Smartlabel 1. SIMATIC Sensors. RFID systems SIMATIC RF630L Smartlabel. Operating Instructions 06/2009 J31069-D0186-U001-A4-7618

Research and Development. Needs for RFID

Introduction to RFID

Basics of EPC. Training

Letter Report: An RFID-enabled Warehouse at DRDC Valcartier

ISO/IEC INTERNATIONAL STANDARD

Koichi Tsuzuki Hitachi Europe, Ltd.

Umapathy M 1, Indhu V 2, Karthick S 3, Ayyanar S 4 1 (Assistant Professor of Computer Science Engineering) The Kavery Engineering College

Information Security in Electronic Toll Fare System

Don t Make the Mistake of Using RFID Technology With an Application Built for Barcodes

Comparative Analysis of Tag Estimation Algorithms on RFID EPC Gen-2 Performance

Identity Management. ID management for people and objects

RFID Tags and Readers

RFID IN HEALTHCARE Technology Meets Stringent Safety Regulations for use in Medical Devices

Ubiquitous Computing in Business Processes Part II

OBID RFID by FEIG ELECTRONIC. RFID Reader Technologies: OBID i-scan HF / UHF

Real World Applications of RFID. Mr. Mike Rogers Bryan Senior High School Omaha, NE

IoT: Applications of RFID and Issues

Should & How RFID System be Evaluated against CC v3.1. InfoCom Security Division Yao-Chang Yu 2007/9/26

Identification & Traceability Solutions for the Industry

EPC Primer. JAG. Nov Texas Instruments proprietary information 1

An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises

Automatic Vehicle Identification at Tollgates and Theft Detection of Vehicles

Seminars of Software and Services for the Information Society. Introduction to RFId Radio Frequency Identification

RFID, Identification & Wireless Systems for the Middle East & North Africa

AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL

An exploration of Radio Frequency Identification (RFID)

AN AUTOMATED TOLL GATE VEHICLE PASSING SYSTEM

SL3S General description. 2. Features and benefits UCODE Key features. Rev May

Secure Middleware for Cold Chain Management

ALN-9768 Wonder Dog Inlay

This is the accepted version of a paper presented at IEEE International Symposium on Communications, Control, and Signal Processing,May 21-24, 2014.

RFID enabled Solutions TYRE MANAGEMENT

RFID middleware design addressing application needs and RFID constraints

PORT & SHIPPINGTECH. Intermec: Leadership and Experience. Globally: Active in over 65 Countries

Research on Design and Implementation of Intelligent Warehouse Management System in Z Company

Smart Brands and Product Protection 2005

Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader

DESIGN, OPERATION AND ANTI-COLLISION PROCEDURE OF DATA TRANSFER OF INTELLIGENT LOAD UNITS

Proposed Solution for Implementation, Monitoring and Maintaining Vehicle Tracking System for vehicles of Solid Waste Management

KEYWORDS: RFID, RFID tags, RFID receiver, Lecturer, Students, Attendance. INTRODUCTION:

ZMC, LLC Distribution. & Technical Services. Library RFID Management System

SL2S1412; SL2S1512; SL2S1612

Transcription:

Lightweight Cryptography for RFID Systems Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA <http://comsec.uwaterloo.ca/ ggong> G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 1 / 25

Outline of Tutorials Part I. Introduction to Security and Privacy of Radio Frequency Identification (RFID) Systems Part II. Design of Lightweight Crypto primitives Part III. Design of Authentication Protocols G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 2 / 25

Part I. Introduction to Security and Privacy of Radio Frequency Identification (RFID) Systems RFID Technology Overview Physical Layer of EPC Tags Security Threats in RFID System G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 3 / 25

RFID Technology Overview RFID Radio Frequency IDentification (RFID) is a method of remotely identifying objects or subjects using transponders (tags) queried through a radio frequency channel. Secure Wired Channels Query & Answer Insecure Wireless Channels Back-end Database Readers Tags Figure: Radio Frequency Identification Architecture G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 4 / 25

Characteristics of RFID Systems The channels between the reader and the back-end database might be wired channels that are usually assumed to be secure. Both reader and back-end server are powerful enough to handle the overhead introduced by performing strong cryptographic protocols. The channels between the tags and the reader are wireless links and are therefore vulnerable to a variety of attacks. RFID tags usually have constrained capabilities in every aspect of computation, communication and storage due to the extremely low production cost. Each tag has a rewritable memory that might be susceptible to compromise. G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 5 / 25

G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 6 / 25

Tag Types (1) Passive Tags All power comes from a reader s signal Tags are inactive unless a reader activates them Cheaper and smaller, but short range Semi-passive Tags On-board battery, but cannot initiate communication More expensive, longer range Active Tags On-board battery, can initiate communication Very expensive, long range G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 7 / 25

Tag Types (2) Low Frequency (LF) Tags High Frequency (HF) Tags Ultra High Frequency (UHF) Tags Frequency Range 125-134 KHz 13.56 MHz 866-915 MHz Read Range 10 cm 1 m 2-7 m Applications Smart Cards, Ticketing Small item management Transportation vehicle ID Animal tagging Supply chain Access/Security Access Control Anti-theft, library Large item management Transportation Supply chain G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 8 / 25

G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 9 / 25

A Typical Application Supply Chain Management Order received, then released for picking Pick & packed into a cargo container. RFID tag applied The tagged cargo is detected as it passes through the shipping dock & ship confirmation is processed Shipping Receiving The tagged cargo is detected as it passes through the receiving dock & Receipt is processed G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 10 / 25

EPC Tags (1) EPCglobal class-1 generation-2 (EPC Gen2 in brief) was approved as ISO 18000-6C in July 2006. It is widely believed that Gen2 tags will be the mainstream for RFID application due to the large effective reading range. Four types of memory in EPC tags: Reserved memory: Store passwords (32-bit) for access to other parts of the memory or to kill a tag. EPC memory: Store EPC code (96-bit) which identifies the tag. This memory is locked. TID memory: Store information that identifies the tag and its functionality (64-bit). User memory: This is optional memory for extending functionalities of tags. G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 11 / 25

EPC Tags (2) The EPC standard specifies a restricted number of mandatory commands for the basic functionality of an RFID-enabled application: Select: This command is used by the reader to select a subset of the tag population. Inventory: These commands are used to establish communications between different tags and the reader. Access: This set of commands allow the reader to functionally interact with a tag (see below). Req_RN: Request the tag to return a 16-bit random number Read: Read the memory on the tag Write: Write to the memory on the tag Kill: Permanently disable the tag Lock: Lock the memory G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 12 / 25

Class 1 Generation 2 UHF Air Interface Protocol Standard Take Class 1 Generation 2 UHF Air Interface Protocol Standard as an example It is a de facto standard for UHF passive RFID systems. It is developed by EPCglobal, which is the successor organization to the MIT Auto-ID Center. This standard specifies: An air interface: the complete communication link between an reader and a tag. Two roles: the reader and the tag. Physical layer: signal design data-coding methodology command-response structure G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 13 / 25

How a Reader interrogates a Tag? 1 3 5 7 Interrogator issues a Query, QueryAdjust, or QueryRep Interrogator acknowledges Tag by issuing ACK with same RN16 Interrogator issues Req_RN containing same RN16 Interrogator accesses Tag. Each access command uses handle as a parameter INTERROGATOR Query/Adjust/Rep RN16 ACK(RN16) {PC, EPC} Req_RN(RN16) handle command(handle) NOTES: -- CRC-16 not shown in transitions -- See command/reply tables for command details TAG 2 4 6 8 Two possible outcomes (assume #1): 1) Slot = 0: Tag responds with RN16 2) Slot <> 0: No reply Two possible outcomes (assume #1): 1) Valid RN16: Tag responds with {PC/XPC, EPC} 2) Invalid RN16: No reply Two possible outcomes (assume #1): 1) Valid RN16: Tag responds with {handle} 2) Invalid RN16: No reply Tag verifies handle. Tag ignores command if handle does not match Figure E.1 Example of Tag inventory and access Note that security and privacy are not considered! G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 14 / 25

Physical Layer of EPC Gen2 Standard Physical Layer of EPC Gen2 Standard G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 15 / 25

Physical Layer of EPC Gen2 Standard Reader Tag Coding and Modulation Reader Tag g Pulse-Interval Encoding: in the right plot, Tari is in 6.25µs to 25µs. DSB- or SSB-ASK Baseband Data: 010 PR-ASK Baseband Data: 010 e.g., a message 010" is encoded as 10 1110 10". The encoded data is modulated by DSB/SSB-ASK, or PR-ASK modulation, e.g., given 10 1110 10" as the baseband signal, the modulated signal is shown in the left plot. Data Symbols H.1 Baseband waveforms, modulated RF, and detected waveforms Amplitude DSB- or SSB-ASK Modulating Waveform PR-ASK Modulating Waveform 1.5 Tari data-1 2.0 Tari Tari 0.5 Tari x Tari Amplitude Data Symbols ata-0 PW PW Amplitude Amplitude ata-1 Data Symbols Data Symbols Figure 6.1 PIE symbols DSB SSB ASK M d l t d RF PR ASK M d l t d RF G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 16 / 25

Physical Layer of EPC Gen2 Standard Tag Reader: Backscatter Modulation Tag Reader Tag switches the reflection coefficient of its antenna between two states in accordance with the data being sent. The backscattered signal is modulated by Amplitude Shift Keying (ASK), which allows the establishment of a communication. Antenna Backscattered signal of bit ``0" 0.2 Antenna Backscattered signal of bit ``1" 1 Load Load G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 17 / 25

Physical Layer of EPC Gen2 Standard Tag Reader: Manchester-like Coding FM0 or Miller is employed in order for the reader to detect collision Query when multiple tags response simultaneously. e.g., FM0 Basis Functions FM0 Generator State Diagram 1 data-0 s2(t) 1 data-1 s1(t) 1 S2 0 amplitude 0 1 T time (t) 0 T time (t) S1 1 0 1 0 1 S3 0 s3(t) = s2(t) s4(t) = s1(t) S4 Figure 6.8 FM0 basis functions and generator state diagram FM0 Symbols 0 0 00 FM0 Sequences 00 1 1 01 01 10 10 11 11 G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 18 / 25

Tag Identification Layer of EPC Gen2 Standard Tag Identification Layer of EPC Gen2 Standard G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 19 / 25

Operations, Commands, States Tag Identification Layer of EPC Gen2 Standard Readers manage tags using three basic operations: Select: Reader selects individual tags from the population. Inventory: Reader identifies tags. Access: Inventory: Reader transacts with individual tags, e.g., read their Query memories. Tags can be viewed as a finite state machine. Access: Reader Select Inventory Access Tags State Ready Arbitrate Reply Acknowledged Open Secured Killed Figure 6.20 Interrogator/Tag operations and Tag state 6.3.2.7 Selecting Tag populations G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 20 / 25

Tag Identification Layer of EPC Gen2 Standard Attacks on Tags: Privacy Violation RFID technology raises two main privacy concerns for users: clandestine physical tracking of tags and inventorying of tags. Misbehaving readers harvest information from well-behaved RFID tags. Since RFID tags automatically respond to the interrogation from the reader without alerting the bearer/owner, a person carrying an RFID tag is prone to clandestine physical tracking. Consequently, an adversary equipped with commodity RFID readers can effectively trace a person carrying a tagged item by linking different sightings of the same RFID tag. In addition, in supply chain applications, individually tagged objects in stores allow competitors to learn about stock turnover rates (inventorying). G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 21 / 25

Tag Identification Layer of EPC Gen2 Standard Attacks on Tags: Authentication Problem RFID authentication focuses on the problem of well-behaved readers receiving information from misbehaving tags (e.g., counterfeit tags). Basic RFID tags (e.g., Gen2 type) are vulnerable to simple counterfeiting attacks or cloning attacks. An attacker can skim the electronic product code (EPC) from a target tag and then program it into a counterfeit tag. Authentication is an important issue when RFID tags are used for access control or as security devices to detect counterfeit products such as medicines, electronics accessories, and other high-value items. In general, today s RFID systems do not conduct mutual authentication between RFID readers and tags, so it is easy for an adversary to impersonate a tag to obtain all of its secret information and then clone new tags. G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 22 / 25

Communication Attacks Tag Identification Layer of EPC Gen2 Standard Many possible security threats arise from unprotected wireless communication between RFID readers and tags. Examples include Spoofing and replay Eavesdropping Jamming Traffic analysis G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 23 / 25

Tag Identification Layer of EPC Gen2 Standard Countermeasures Physical Protection Deactivation Re-naming User-Oriented Proxy Or Filter Jamming Entity authentication Distance measurement, Faraday cage approach Killing, sleeping, hash lock Relabeling or effacing, minimalist cryptography, reencryption Light Crypto based approaches Watchdog tag, RFID guardian Blocking, soft-blocking tag PRG-based, hash-based, private authentication G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 24 / 25

Tag Identification Layer of EPC Gen2 Standard Performance Requirements Low Computational Cost: The computational overhead of authentication protocols in the tag side should be small due to the limited power available to RFID tags. Low Communication Cost: The message transmitted in the authentication phase should be minimized because of the limited bandwidth available to RFID tags. Low Storage Requirement: The data stored in a RFID tag should be kept as small as possible since the tag memory is extremely constrained. Scalability: The back-end database should be able to efficiently identify an individual tag even though the tag population is huge. G. Gong (University of Waterloo) Lightweight Crypto for RFID: Part I December 12, 2010 25 / 25