SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
Security & Blockchain Track
March 7, 2018
Integrity of Things:
Exploring NFC and Blockchain
Ajit Kulkarni
VP of Product, Chronicled
Stephane Ardiley; Director
Product Management, Identiv
Global Supply Chains are inefficient and riddled with
issues.
Counterfeiting alone is a global $2Tn problem.
What is Blockchain?
Blockchain for Supply Chain: How it Works
High Value Products: Secure Sealing
Cryptoseal
Temp Sensitive Products: Cold Chain
Logistics
TempLogger
Introducing Temperature Logger
Cloud Service
• Label management, configuration,
and temperature profiles
• Collects and stores records in
database
• Cloud-based analytics and
remediation Integrity check of
temperature records
Mobile App
• Tag activation and setup
• Online/offline option
• Local analytics with graph
• Android-based app available via
Google Play
• Compatible with Moto X, Nexus,
LGE, Samsung (S5 and up), and Sony
Ericsson Xperia
Label
• Low-cost, self-adhesive
• Precise temperature sensor
• Digital storage
• Flexible battery
• NFC-enabled
Smart Sensor Label
• Small credit card-sized NFC label for temperature data logging
• Thin, flexible battery
• Temperature: -30 to 50˚C (-22 to 122 ˚F)
• Battery life: Up to 8 months
• Log capacity: >10,000 (can exceed 30,000)
• Configurable logging interval
• NXP NHS3100 with embedded accurate temperature sensor
• Protected temperature records (target CFR21 part 11)
• ISO/IEC 17025 temperature calibration procedure
• Programmable software/firmware to support additional use cases,
i.e. alarm setup, record only extreme temperatures, etc.
Developed by:
Trusted IoT & Smart Supply Chain
Solutions
A Peer-to-Peer Approach to Digital Key
Sharing for Vehicle Access & Control
Tony Rosati
Director of IOT Security, ESCRYPT
Agenda
• Motivation for Digital Key Sharing
• Architecture
• Security Model
• Security Analysis
• Future Work
Smartphone Access Control & Key
Sharing
• No need to
manage physical
keys
• Desire/Need to use
the Smartphone
• Vehicle sharing
• Security alerts
• Control/Status
Car Sharing Growth
• Cars are increasingly too
costly to own in the urban
environment
• Cars sit unused most of the
time
• Many new services:
• BMW Drivenow,
• Avis: Zip Car,
• Daimler: Car2Go,
• Uber,
• Lyft
Smartphone/Vehicle Integration
Vehicle Access
• NFC and/or Bluetooth
• Security of the smartphone?
Enable
• Wireless Charging
Bluetooth Handoff
• Vehicle personalization
Consumers Expect a Seamless User
Experience
Connected Car Consortium Model
ESCRYPT CycurACCESS Architecture
• Leverage Public Key Infrastructure (PKI)
• Enables efficient digital key sharing
• Issue Identity Certificates
• Massively scalable
• Leverage Mobile Platform Security
• Secure Boot
• Secure Key Store (hardware level attestation)
• Sandboxing
• Code Signing
Key Sharing Server
Owner
Smartphone
Friend
Smartphone
Certificate Authority
Cellular/
WiFi
NFC/BLE
TSM
Proving Identity
• Certificate Authority provides a root of trust
• Identity certificates are issued to each user
and each vehicle
• Vehicle certificates issued in production
• User Certificates issued at registration
• Entities in the system can now verify each
other’s identity securely and efficiently
• Verification can be performed offline
Establishing Ownership
• Each vehicle is assigned a random Ownership
Code during manufacture
• The owner and the vehicle exchange
certificates & a challenge to prove identity
• The owner sends the Ownership Code to the
vehicle to prove ownership
• If valid, vehicle stores new owner certificate for
future use
• Vehicle generates and forwards signed
“proof” to KSS via the owner to confirm new
ownership
Ownership Code
12345678901234
56789012345678
90121234123
1231245124343
Ownership Code
12345678901234
56789012345678
90121234123
1231245124343
Key Sharing Server
(KSS)
Gaining Access
• To unlock the vehicle, the
owner and vehicle begin by
exchanging certificates & a
challenge to prove identity
• The vehicle verifies the identity
against stored owner
certificate. If so, access is
granted
Owner
Key Sharing
• Owner creates and signs Sharing Permission
containing Vehicle ID, serial number of
friend’s Identity certificate and any
restrictions
• Owner forwards Sharing Permission to the
friend via the KSS or P2P
• Note that the KSS does not have to be
involved in this process
Key Sharing Server
Owner Friend
Shared Access
• To unlock the vehicle, the friend and vehicle begin by
exchanging certificates & a challenge to prove identity
• The friend sends the Sharing Permission to the vehicle
• The vehicle verifies that the following is true of the Permission:
• Issued for this vehicle
• Issued to the friend
• Signed by the owner
• No restrictions are violated
• If checks pass, access is granted
Friend
Car Sharing Service
• All vehicles are owned by the service
• All valid members are issued permissions
• The vehicle verifies that the following is true of the Permission:
• Issued for this vehicle
• Issued to the member
• Signed by the service
• No restrictions are violated
• If checks pass, access is granted
• How do we revoke bad actors?
Members
Key Sharing Server
Revoke a Permission
• To revoke a Permission, the owner generates a
signed revocation request and forwards to the
KSS
• If valid, the KSS generates a revocation
notification and forwards to the friend’s device
• Friend’s device deletes the affected Permission
Key Sharing Server
Owner Friend
Dealing with Cheaters
• What if the friend is
dishonest?
• Friend takes their device
offline to prevent the
Permission from being deleted
• How does a car know that a
permission is revoked?
• What can be done to
mitigate this?
• Three ideas:
• Next time the owner unlocks the
vehicle, a list of recently revoked
Permissions can be transferred to the
vehicle
• Permissions could require a periodic
authorization from the KSS to remain
valid. (Say every 24 hours)
• A connected car receives revocations
directly
Security Analysis/Threat Model
• Based on the work of
Symeonidis et al.
• Main Features
• Private keys are never
transported & stored in SE
• KSS compromise cant be used
to gain or share access
• Most operations are performed
offline which limits the attack
surface (ie Denial-of-Service)
Key Sharing Server
Owner
Smartphone
Friend
Smartphone
Certificate Authority
Cellular/
WiFi
NFC/BLE
Relay Attack
• Mitigation Strategies
• Easy
• User based preference
• Smartphone screen off
• Hard
• RF Finger Print
• Distance Bounding
• Brands and Chaum 1994 – smart cards
• Gambs et al 2016 – smartphones
• Can detect adversary constantly > 1.5ms relay
Vehicle Owner Attacker 1 Attacker 2
Conclusion & Future Work
• A new approach digital Key Sharing
• Using well-known PKI & modern smartphone security
• Most operations are done offline to limit the attack surface
• Futures
• Hardware level Key Attastation
• Relay Attack Countermeasures
• Thank you
• tony.rosati@escrypt.com

Weitere ähnliche Inhalte

Was ist angesagt?

VISIONFC Automotive Summit
VISIONFC Automotive SummitVISIONFC Automotive Summit
VISIONFC Automotive SummitNFC Forum
 
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...NFC Forum
 
RFID Journal Live! 2019
RFID Journal Live! 2019RFID Journal Live! 2019
RFID Journal Live! 2019NFC Forum
 
Cashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanCashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanNFC Forum
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC Forum
 
Razorfish nfc technologies presentation 2013
Razorfish nfc technologies presentation 2013Razorfish nfc technologies presentation 2013
Razorfish nfc technologies presentation 2013Razorfish
 
HCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a TransactionHCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a TransactionNFC Forum
 
Mwc 2013 a devices review
Mwc 2013 a devices reviewMwc 2013 a devices review
Mwc 2013 a devices reviewMTKDMI
 
Visionfc payment transport summit final complete public
Visionfc payment  transport summit final complete   publicVisionfc payment  transport summit final complete   public
Visionfc payment transport summit final complete publicNFC Forum
 
History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...NFC Forum
 
Visionfc payment transport summit final complete public
Visionfc payment  transport summit final complete   publicVisionfc payment  transport summit final complete   public
Visionfc payment transport summit final complete publicNFC Forum
 
Tap into NFC Showcase - Shanghai
Tap into NFC Showcase - ShanghaiTap into NFC Showcase - Shanghai
Tap into NFC Showcase - ShanghaiNFC Forum
 
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Team
 
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...NFC Forum
 
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive
 
Tap & Connect: How NFC Enhances the IoT
Tap & Connect: How NFC Enhances the IoTTap & Connect: How NFC Enhances the IoT
Tap & Connect: How NFC Enhances the IoTNFC Forum
 
Mobiz Technologies services
Mobiz Technologies servicesMobiz Technologies services
Mobiz Technologies servicesBruno Zysman
 
MasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFCMasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFCNFC Forum
 
Near field communication & Branding
Near field communication & BrandingNear field communication & Branding
Near field communication & BrandingNiels Mulder
 

Was ist angesagt? (20)

VISIONFC Automotive Summit
VISIONFC Automotive SummitVISIONFC Automotive Summit
VISIONFC Automotive Summit
 
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
 
RFID Journal Live! 2019
RFID Journal Live! 2019RFID Journal Live! 2019
RFID Journal Live! 2019
 
Cashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in JapanCashless Society - Latest Developments in Japan
Cashless Society - Latest Developments in Japan
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
 
Digital reality nxp final.pptx
Digital reality nxp final.pptxDigital reality nxp final.pptx
Digital reality nxp final.pptx
 
Razorfish nfc technologies presentation 2013
Razorfish nfc technologies presentation 2013Razorfish nfc technologies presentation 2013
Razorfish nfc technologies presentation 2013
 
HCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a TransactionHCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a Transaction
 
Mwc 2013 a devices review
Mwc 2013 a devices reviewMwc 2013 a devices review
Mwc 2013 a devices review
 
Visionfc payment transport summit final complete public
Visionfc payment  transport summit final complete   publicVisionfc payment  transport summit final complete   public
Visionfc payment transport summit final complete public
 
History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...
 
Visionfc payment transport summit final complete public
Visionfc payment  transport summit final complete   publicVisionfc payment  transport summit final complete   public
Visionfc payment transport summit final complete public
 
Tap into NFC Showcase - Shanghai
Tap into NFC Showcase - ShanghaiTap into NFC Showcase - Shanghai
Tap into NFC Showcase - Shanghai
 
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
 
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
JITI Public Transportation Seminar 2018, " Public Transportation in a Cashles...
 
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
 
Tap & Connect: How NFC Enhances the IoT
Tap & Connect: How NFC Enhances the IoTTap & Connect: How NFC Enhances the IoT
Tap & Connect: How NFC Enhances the IoT
 
Mobiz Technologies services
Mobiz Technologies servicesMobiz Technologies services
Mobiz Technologies services
 
MasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFCMasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFC
 
Near field communication & Branding
Near field communication & BrandingNear field communication & Branding
Near field communication & Branding
 

Ă„hnlich wie Connections Summit - Security & Blockchain Track

How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityGlobalSign
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureVinod Wilson
 
JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...PROIDEA
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peteritnewsafrica
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems Maganathin Veeraragaloo
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low CostDonald Malloy
 
Netmera_Presentation.pdf
Netmera_Presentation.pdfNetmera_Presentation.pdf
Netmera_Presentation.pdfMustafa KuÄźu
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedArash Ramez
 
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...New York Public Transit Association
 
Web authentication
Web authenticationWeb authentication
Web authenticationPradeep J V
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceJuarez Junior
 
LKMUG - Azure Blockchain for Developers
LKMUG - Azure Blockchain for DevelopersLKMUG - Azure Blockchain for Developers
LKMUG - Azure Blockchain for DevelopersJuarez Junior
 
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License PresentantionOpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License PresentantionMikeLeszcz
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfFinTech Belgium
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.NextMark Diodati
 

Ă„hnlich wie Connections Summit - Security & Blockchain Track (20)

How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architecture
 
JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
 
Access management
Access managementAccess management
Access management
 
Netmera_Presentation.pdf
Netmera_Presentation.pdfNetmera_Presentation.pdf
Netmera_Presentation.pdf
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
 
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
Implementing Contactless Fare Collection Systems - Danielle Pinkus, Instructi...
 
Web authentication
Web authenticationWeb authentication
Web authentication
 
Context Based Authentication
Context Based AuthenticationContext Based Authentication
Context Based Authentication
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain Service
 
LKMUG - Azure Blockchain for Developers
LKMUG - Azure Blockchain for DevelopersLKMUG - Azure Blockchain for Developers
LKMUG - Azure Blockchain for Developers
 
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License PresentantionOpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
 
E-Business security
E-Business security E-Business security
E-Business security
 

Mehr von NFC Forum

NFC Forum Technology Roadmap Webinar Slides
NFC Forum Technology Roadmap Webinar SlidesNFC Forum Technology Roadmap Webinar Slides
NFC Forum Technology Roadmap Webinar SlidesNFC Forum
 
NFC Forum Healthcare Webinar
NFC Forum Healthcare WebinarNFC Forum Healthcare Webinar
NFC Forum Healthcare WebinarNFC Forum
 
NFC Forum Wireless Charging Webinar
NFC Forum Wireless Charging WebinarNFC Forum Wireless Charging Webinar
NFC Forum Wireless Charging WebinarNFC Forum
 
Beyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleBeyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleNFC Forum
 
NFC Charging for Enterprise Class Devices
NFC Charging  for Enterprise Class DevicesNFC Charging  for Enterprise Class Devices
NFC Charging for Enterprise Class DevicesNFC Forum
 
The Commons Project
The Commons ProjectThe Commons Project
The Commons ProjectNFC Forum
 
SpokenRX Use Case
SpokenRX Use CaseSpokenRX Use Case
SpokenRX Use CaseNFC Forum
 
Innovative NFC Use Cases
Innovative NFC Use CasesInnovative NFC Use Cases
Innovative NFC Use CasesNFC Forum
 
How eBay Achieved a 90% Customer Satisfaction Rate with NFC
How eBay Achieved a 90% Customer Satisfaction Rate with NFCHow eBay Achieved a 90% Customer Satisfaction Rate with NFC
How eBay Achieved a 90% Customer Satisfaction Rate with NFCNFC Forum
 
NFC Forum Story
NFC Forum StoryNFC Forum Story
NFC Forum StoryNFC Forum
 
ABI Research NFC Consumer Experience Survey Results
ABI Research NFC Consumer Experience Survey ResultsABI Research NFC Consumer Experience Survey Results
ABI Research NFC Consumer Experience Survey ResultsNFC Forum
 
NFC Forum Certification Program Webinar
NFC Forum Certification Program WebinarNFC Forum Certification Program Webinar
NFC Forum Certification Program WebinarNFC Forum
 
Connecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
Connecting the Unconnected: The Unique Power of NFC in IoT Data AcquisitionConnecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
Connecting the Unconnected: The Unique Power of NFC in IoT Data AcquisitionNFC Forum
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum
 
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...NFC Forum
 
NFC Forum User Experience Survey Update
NFC Forum User Experience Survey UpdateNFC Forum User Experience Survey Update
NFC Forum User Experience Survey UpdateNFC Forum
 

Mehr von NFC Forum (20)

NFC Forum Technology Roadmap Webinar Slides
NFC Forum Technology Roadmap Webinar SlidesNFC Forum Technology Roadmap Webinar Slides
NFC Forum Technology Roadmap Webinar Slides
 
NFC Forum Healthcare Webinar
NFC Forum Healthcare WebinarNFC Forum Healthcare Webinar
NFC Forum Healthcare Webinar
 
NFC Forum Wireless Charging Webinar
NFC Forum Wireless Charging WebinarNFC Forum Wireless Charging Webinar
NFC Forum Wireless Charging Webinar
 
Beyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at ScaleBeyond Payment: Deploying NFC at Scale
Beyond Payment: Deploying NFC at Scale
 
NFC Charging for Enterprise Class Devices
NFC Charging  for Enterprise Class DevicesNFC Charging  for Enterprise Class Devices
NFC Charging for Enterprise Class Devices
 
The Commons Project
The Commons ProjectThe Commons Project
The Commons Project
 
SpokenRX Use Case
SpokenRX Use CaseSpokenRX Use Case
SpokenRX Use Case
 
Innovative NFC Use Cases
Innovative NFC Use CasesInnovative NFC Use Cases
Innovative NFC Use Cases
 
How eBay Achieved a 90% Customer Satisfaction Rate with NFC
How eBay Achieved a 90% Customer Satisfaction Rate with NFCHow eBay Achieved a 90% Customer Satisfaction Rate with NFC
How eBay Achieved a 90% Customer Satisfaction Rate with NFC
 
NFC Forum Story
NFC Forum StoryNFC Forum Story
NFC Forum Story
 
ABI Research NFC Consumer Experience Survey Results
ABI Research NFC Consumer Experience Survey ResultsABI Research NFC Consumer Experience Survey Results
ABI Research NFC Consumer Experience Survey Results
 
NFC Forum Certification Program Webinar
NFC Forum Certification Program WebinarNFC Forum Certification Program Webinar
NFC Forum Certification Program Webinar
 
Connecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
Connecting the Unconnected: The Unique Power of NFC in IoT Data AcquisitionConnecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
Connecting the Unconnected: The Unique Power of NFC in IoT Data Acquisition
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
 
NFC Forum MaaS Case Studies
NFC Forum MaaS Case StudiesNFC Forum MaaS Case Studies
NFC Forum MaaS Case Studies
 
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
Management and Use of Identities in Mobility and Transport Powered by NFC Tec...
 
NFC Forum User Experience Survey Update
NFC Forum User Experience Survey UpdateNFC Forum User Experience Survey Update
NFC Forum User Experience Survey Update
 

KĂĽrzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

KĂĽrzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Connections Summit - Security & Blockchain Track

  • 1. Security & Blockchain Track March 7, 2018
  • 2. Integrity of Things: Exploring NFC and Blockchain Ajit Kulkarni VP of Product, Chronicled Stephane Ardiley; Director Product Management, Identiv
  • 3. Global Supply Chains are inefficient and riddled with issues.
  • 4. Counterfeiting alone is a global $2Tn problem.
  • 6. Blockchain for Supply Chain: How it Works
  • 7. High Value Products: Secure Sealing Cryptoseal
  • 8. Temp Sensitive Products: Cold Chain Logistics TempLogger
  • 9. Introducing Temperature Logger Cloud Service • Label management, configuration, and temperature profiles • Collects and stores records in database • Cloud-based analytics and remediation Integrity check of temperature records Mobile App • Tag activation and setup • Online/offline option • Local analytics with graph • Android-based app available via Google Play • Compatible with Moto X, Nexus, LGE, Samsung (S5 and up), and Sony Ericsson Xperia Label • Low-cost, self-adhesive • Precise temperature sensor • Digital storage • Flexible battery • NFC-enabled
  • 10. Smart Sensor Label • Small credit card-sized NFC label for temperature data logging • Thin, flexible battery • Temperature: -30 to 50ËšC (-22 to 122 ËšF) • Battery life: Up to 8 months • Log capacity: >10,000 (can exceed 30,000) • Configurable logging interval • NXP NHS3100 with embedded accurate temperature sensor • Protected temperature records (target CFR21 part 11) • ISO/IEC 17025 temperature calibration procedure • Programmable software/firmware to support additional use cases, i.e. alarm setup, record only extreme temperatures, etc. Developed by:
  • 11. Trusted IoT & Smart Supply Chain Solutions
  • 12. A Peer-to-Peer Approach to Digital Key Sharing for Vehicle Access & Control Tony Rosati Director of IOT Security, ESCRYPT
  • 13. Agenda • Motivation for Digital Key Sharing • Architecture • Security Model • Security Analysis • Future Work
  • 14. Smartphone Access Control & Key Sharing • No need to manage physical keys • Desire/Need to use the Smartphone • Vehicle sharing • Security alerts • Control/Status
  • 15. Car Sharing Growth • Cars are increasingly too costly to own in the urban environment • Cars sit unused most of the time • Many new services: • BMW Drivenow, • Avis: Zip Car, • Daimler: Car2Go, • Uber, • Lyft
  • 16. Smartphone/Vehicle Integration Vehicle Access • NFC and/or Bluetooth • Security of the smartphone? Enable • Wireless Charging Bluetooth Handoff • Vehicle personalization
  • 17. Consumers Expect a Seamless User Experience
  • 19. ESCRYPT CycurACCESS Architecture • Leverage Public Key Infrastructure (PKI) • Enables efficient digital key sharing • Issue Identity Certificates • Massively scalable • Leverage Mobile Platform Security • Secure Boot • Secure Key Store (hardware level attestation) • Sandboxing • Code Signing Key Sharing Server Owner Smartphone Friend Smartphone Certificate Authority Cellular/ WiFi NFC/BLE TSM
  • 20. Proving Identity • Certificate Authority provides a root of trust • Identity certificates are issued to each user and each vehicle • Vehicle certificates issued in production • User Certificates issued at registration • Entities in the system can now verify each other’s identity securely and efficiently • Verification can be performed offline
  • 21. Establishing Ownership • Each vehicle is assigned a random Ownership Code during manufacture • The owner and the vehicle exchange certificates & a challenge to prove identity • The owner sends the Ownership Code to the vehicle to prove ownership • If valid, vehicle stores new owner certificate for future use • Vehicle generates and forwards signed “proof” to KSS via the owner to confirm new ownership Ownership Code 12345678901234 56789012345678 90121234123 1231245124343 Ownership Code 12345678901234 56789012345678 90121234123 1231245124343 Key Sharing Server (KSS)
  • 22. Gaining Access • To unlock the vehicle, the owner and vehicle begin by exchanging certificates & a challenge to prove identity • The vehicle verifies the identity against stored owner certificate. If so, access is granted Owner
  • 23. Key Sharing • Owner creates and signs Sharing Permission containing Vehicle ID, serial number of friend’s Identity certificate and any restrictions • Owner forwards Sharing Permission to the friend via the KSS or P2P • Note that the KSS does not have to be involved in this process Key Sharing Server Owner Friend
  • 24. Shared Access • To unlock the vehicle, the friend and vehicle begin by exchanging certificates & a challenge to prove identity • The friend sends the Sharing Permission to the vehicle • The vehicle verifies that the following is true of the Permission: • Issued for this vehicle • Issued to the friend • Signed by the owner • No restrictions are violated • If checks pass, access is granted Friend
  • 25. Car Sharing Service • All vehicles are owned by the service • All valid members are issued permissions • The vehicle verifies that the following is true of the Permission: • Issued for this vehicle • Issued to the member • Signed by the service • No restrictions are violated • If checks pass, access is granted • How do we revoke bad actors? Members Key Sharing Server
  • 26. Revoke a Permission • To revoke a Permission, the owner generates a signed revocation request and forwards to the KSS • If valid, the KSS generates a revocation notification and forwards to the friend’s device • Friend’s device deletes the affected Permission Key Sharing Server Owner Friend
  • 27. Dealing with Cheaters • What if the friend is dishonest? • Friend takes their device offline to prevent the Permission from being deleted • How does a car know that a permission is revoked? • What can be done to mitigate this? • Three ideas: • Next time the owner unlocks the vehicle, a list of recently revoked Permissions can be transferred to the vehicle • Permissions could require a periodic authorization from the KSS to remain valid. (Say every 24 hours) • A connected car receives revocations directly
  • 28. Security Analysis/Threat Model • Based on the work of Symeonidis et al. • Main Features • Private keys are never transported & stored in SE • KSS compromise cant be used to gain or share access • Most operations are performed offline which limits the attack surface (ie Denial-of-Service) Key Sharing Server Owner Smartphone Friend Smartphone Certificate Authority Cellular/ WiFi NFC/BLE
  • 29. Relay Attack • Mitigation Strategies • Easy • User based preference • Smartphone screen off • Hard • RF Finger Print • Distance Bounding • Brands and Chaum 1994 – smart cards • Gambs et al 2016 – smartphones • Can detect adversary constantly > 1.5ms relay Vehicle Owner Attacker 1 Attacker 2
  • 30. Conclusion & Future Work • A new approach digital Key Sharing • Using well-known PKI & modern smartphone security • Most operations are done offline to limit the attack surface • Futures • Hardware level Key Attastation • Relay Attack Countermeasures • Thank you • tony.rosati@escrypt.com