SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Faisal Razzak
Politecnico di Torino, e-Lite research group
http://elite.polito.it
RFID Protocol
   YA-TRAP [1] , YA-TRAP+ [2]
   A Zero knowledge RFID protocol [3]
   OSK/AO Schemes [4][5]
   Hash-Locks [6]
   O-TRAP [7]
Privacy of RFID Protocols.


           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
Yet Another- Trivial RFID Authentication
Protocol.
Inexpensive, untraceable identification of
RFID tags.
Used for Batch Mode.
Inspired by Herzberg work of
anonymous authentication of Mobile
users that move between domains [8].

           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
Susceptible to trivial DOS attacks.
Implicit assumption that a tag is never
authenticated more than once within the
same interval.




          RFID Protocols & privacy for RFID
                     protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
Focus on post purchase problem to
eliminate trade-of between convenience
and security by ensuring the device
owner control of information leakage.
Explain working ?




          RFID Protocols & privacy for RFID
                     protocols
Zero knowledge authentication Message:




Response (If authenticated)




            RFID Protocols & privacy for RFID
                       protocols
Can Zero-Knowledge Tags Protect
Privacy? [9]
Augmented Protocol
– Act as a toggle switch.
– Application specific commands could be
  added as a fourth instance.
– Changing SSDK .
– More SSDK.


           RFID Protocols & privacy for RFID
                      protocols
Setup
Interrogation
Identification




           RFID Protocols & privacy for RFID
                      protocols
Deterministic Hash-Locks
Randomized Hash-Locks.




          RFID Protocols & privacy for RFID
                     protocols
An optimistic , secure 1-pass anonymous
authentication protocol.
Optimistic means the security overhead is
minimal when the parties are honest.




           RFID Protocols & privacy for RFID
                      protocols
Secure Channel

Trusted            Reader                              Tag
 Server




                   RFID Protocols & privacy for RFID
                              protocols
MAC: Hki{.} be a pseudo-random
function.
Kill-keys
Timing Attacks




          RFID Protocols & privacy for RFID
                     protocols
MARP1 [10]
MARP2
Auth2 [11]
RIPP-FS [12]




          RFID Protocols & privacy for RFID
                     protocols
RFID Protocols & privacy for RFID
           protocols
Execute(R, T , i)
Send (U1, U2, i , m)
Corrupt (T, K)
TestUPriv (U,i)




           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
t0 max-time tmax0, t1 max-time tmax1
tmax0 < tmax1.
Learning
– Send tj = tmax0 to any T { to, t1}.
Challenge
– Send tj for tmaxo <tj < tmax1.
– If T=t0, response will be PRNG.(Not
  validated)
– If T=t1, response will be validated.
  HMACKi(tj)
              RFID Protocols & privacy for RFID
                         protocols
Cloning.




           RFID Protocols & privacy for RFID
                      protocols
Learning
– Send t0 with some rt and t, where t >>>> t0.
– Response = ri, h1 = Hk{00||t||rt}.
– Stops 2nd communication from Reader to
  Tag.
Challenge
– Send same t and rt
– If T=t0, response same like before.
– If T=t1, response will be different.
            RFID Protocols & privacy for RFID
                       protocols
Learning
– Send query to the tag T0 with random values
  rt repeatedly, causing tag to update its value
  to well in future.
Challenge
– Passive Role
– Execute Query to see if reader accepts the
  tag as valid. If not, then the adversary knows
  this is the marked tag.
– Conflict of view

            RFID Protocols & privacy for RFID
                       protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
Protocol modification to analyze if the
current tag counter differ more than d
from the previous counter.
Slowing rate of the responses




           RFID Protocols & privacy for RFID
                      protocols
RFID Protocols & privacy for RFID
           protocols
RFID Protocols & privacy for RFID
           protocols
A Zero Knowledge RFID protocol




                     RFID Protocols & privacy for RFID
                                protocols
Vulnerability in ZK with Shared Keys
Repairing ZK
Power analysis attack [14]
Logical layer silence does not imply RF
silence.




           RFID Protocols & privacy for RFID
                      protocols
Deterministic Hash lock
Randomized Hash lock




          RFID Protocols & privacy for RFID
                     protocols
Challenge: nonceR
response




          RFID Protocols & privacy for RFID
                     protocols
No replay attack .
Like OSK/AO, the tag does not store
internal state on nonceR.
No counter or timestamp that can be
manipulated like YA-TRAP.
It always yeild output unlike ZK.



          RFID Protocols & privacy for RFID
                     protocols
1.   G Tsudik , YA-TRAP: Yet another trivial RFID authentication
     protocolWorkshops, 2006. PerCom Workshops 2006.
2.    C Chatmon, T van Le and M Burmester , secure anonymous rfid authentication
     protocol Florida State University, 2006
3.    Engberg, S.J. and Harning, M.B. and Jensen, C.D., ero-knowledge device
     authentication: Privacy & security enhanced RFID preserving business value and
     consumer convenience, Second Annual Conference on Privacy, Security, and Trust
     , 2004.
4.    M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to privacy-
     friendly tags. In RFID Privacy Workshop, MIT, USA, 2003.
5.   G Avoine and P Oechslin , A scalable and provably secure Hash-based RFID
     Protocol, Third IEEE International Conference on Pervasive Computing and
     Communications Workshops, 2005.
6.    S Weis, S Sarma, R Rivest, D Engels , Security and privacy aspects of low-cost
     radio frequency identification systems Security in Pervasive Computing, 2004




                         RFID Protocols & privacy for RFID
                                    protocols
7. M Burmester, T Van Le, B De Medeiros , Provably secure ubiquitous systems:
       Universally composable RFID authentication protocol, Securecomm and
       Workshops, 2006
8. A.Herzberg, H.Krawczyk and G.Tsudil, On Travaling Incognito, IEE workshop on
       Mobile Systems and Applications, December 1994.
 9. F. Khan, Can Zero-Knowledge tags protect privacy, RFID Journal, 2005.
10. SC Kim, SS Yeo and S Kim, MARP: Mobile agent for rfid privacy protection, Smart
       Card Research and Advanced Applications – Springer
11. CC Tan, B Sheng, and Q Li, Severless search and authentication protocols
       for RFID, IEEE transactions on wireless communications, 2008 .
12. M Conti, RD Pietro, LV Mancini, RIPP-FS: An RFID Identification, Privacy
       Preserving Protocol with Forward SecrecyA Spognardi - Pervasive Computing and
       Communications workshop, 2007
 13. A Juels, SA Weis -, Defining Strong privacy for RFID, ACM Transactions on
       Information and System 2009
14. Khaled Ouafi and Raphael C. –W. Phan, Privacy of Recent RFID Authentication
       Protocols, Information Security Practice and Experience, 2008 - Springer

                         RFID Protocols & privacy for RFID
                                    protocols
Faisal Razzak
Faisal.razzak@polito.it

Weitere Àhnliche Inhalte

Was ist angesagt?

Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
Positive Hack Days
 
What is rfid
What is rfidWhat is rfid
What is rfid
aniket0507
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
avinash yada
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfid
Ecwayt
 

Was ist angesagt? (20)

RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
RFID technology fundamentals. How to choose an RFID tag?
RFID technology fundamentals. How to choose an RFID tag?RFID technology fundamentals. How to choose an RFID tag?
RFID technology fundamentals. How to choose an RFID tag?
 
RFID
RFIDRFID
RFID
 
What is rfid
What is rfidWhat is rfid
What is rfid
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksRFID and Wireless Sensor Networks
RFID and Wireless Sensor Networks
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply Chain
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID
RFIDRFID
RFID
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfid
 

Ähnlich wie RFID Protocols and Privacy Models for RFID

Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
Positive Hack Days
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
Alexander Decker
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
Cecile Tan
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
Cecile Tan
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
Liz Sims
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
Shahryar Ali
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
musicalmood
 

Ähnlich wie RFID Protocols and Privacy Models for RFID (20)

Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithmEnhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
Rfid101 rfid introduction_lr
Rfid101 rfid introduction_lrRfid101 rfid introduction_lr
Rfid101 rfid introduction_lr
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
RFID Project.pptx
RFID Project.pptxRFID Project.pptx
RFID Project.pptx
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
Rfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider CRfid Roadii For Wal Mart Provider C
Rfid Roadii For Wal Mart Provider C
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food Systems
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
RFID
RFIDRFID
RFID
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
 
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management SystemA Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
 
Bluetooth rfid readers
Bluetooth rfid readersBluetooth rfid readers
Bluetooth rfid readers
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
RFID & IOT
RFID & IOTRFID & IOT
RFID & IOT
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 

Mehr von Faisal Razzak

Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics Poster
Faisal Razzak
 

Mehr von Faisal Razzak (6)

The Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart EnvironmentsThe Role of Semantic Web Technologies in Smart Environments
The Role of Semantic Web Technologies in Smart Environments
 
LO(D)D ant2012
LO(D)D ant2012LO(D)D ant2012
LO(D)D ant2012
 
Recommendations for selection process automation in systematic reviews
Recommendations for selection process automation in systematic reviewsRecommendations for selection process automation in systematic reviews
Recommendations for selection process automation in systematic reviews
 
2nd year PHD Report
2nd year PHD Report2nd year PHD Report
2nd year PHD Report
 
WoD: Application for Ageing Society
WoD: Application for Ageing SocietyWoD: Application for Ageing Society
WoD: Application for Ageing Society
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics Poster
 

KĂŒrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

KĂŒrzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

RFID Protocols and Privacy Models for RFID

  • 1. Faisal Razzak Politecnico di Torino, e-Lite research group http://elite.polito.it
  • 2. RFID Protocol YA-TRAP [1] , YA-TRAP+ [2] A Zero knowledge RFID protocol [3] OSK/AO Schemes [4][5] Hash-Locks [6] O-TRAP [7] Privacy of RFID Protocols. RFID Protocols & privacy for RFID protocols
  • 3. RFID Protocols & privacy for RFID protocols
  • 4. Yet Another- Trivial RFID Authentication Protocol. Inexpensive, untraceable identification of RFID tags. Used for Batch Mode. Inspired by Herzberg work of anonymous authentication of Mobile users that move between domains [8]. RFID Protocols & privacy for RFID protocols
  • 5. RFID Protocols & privacy for RFID protocols
  • 6. Susceptible to trivial DOS attacks. Implicit assumption that a tag is never authenticated more than once within the same interval. RFID Protocols & privacy for RFID protocols
  • 7. RFID Protocols & privacy for RFID protocols
  • 8. RFID Protocols & privacy for RFID protocols
  • 9. Focus on post purchase problem to eliminate trade-of between convenience and security by ensuring the device owner control of information leakage. Explain working ? RFID Protocols & privacy for RFID protocols
  • 10. Zero knowledge authentication Message: Response (If authenticated) RFID Protocols & privacy for RFID protocols
  • 11. Can Zero-Knowledge Tags Protect Privacy? [9] Augmented Protocol – Act as a toggle switch. – Application specific commands could be added as a fourth instance. – Changing SSDK . – More SSDK. RFID Protocols & privacy for RFID protocols
  • 12. Setup Interrogation Identification RFID Protocols & privacy for RFID protocols
  • 13. Deterministic Hash-Locks Randomized Hash-Locks. RFID Protocols & privacy for RFID protocols
  • 14. An optimistic , secure 1-pass anonymous authentication protocol. Optimistic means the security overhead is minimal when the parties are honest. RFID Protocols & privacy for RFID protocols
  • 15. Secure Channel Trusted Reader Tag Server RFID Protocols & privacy for RFID protocols
  • 16. MAC: Hki{.} be a pseudo-random function. Kill-keys Timing Attacks RFID Protocols & privacy for RFID protocols
  • 17. MARP1 [10] MARP2 Auth2 [11] RIPP-FS [12] RFID Protocols & privacy for RFID protocols
  • 18. RFID Protocols & privacy for RFID protocols
  • 19. Execute(R, T , i) Send (U1, U2, i , m) Corrupt (T, K) TestUPriv (U,i) RFID Protocols & privacy for RFID protocols
  • 20. RFID Protocols & privacy for RFID protocols
  • 21. t0 max-time tmax0, t1 max-time tmax1 tmax0 < tmax1. Learning – Send tj = tmax0 to any T { to, t1}. Challenge – Send tj for tmaxo <tj < tmax1. – If T=t0, response will be PRNG.(Not validated) – If T=t1, response will be validated. HMACKi(tj) RFID Protocols & privacy for RFID protocols
  • 22. Cloning. RFID Protocols & privacy for RFID protocols
  • 23. Learning – Send t0 with some rt and t, where t >>>> t0. – Response = ri, h1 = Hk{00||t||rt}. – Stops 2nd communication from Reader to Tag. Challenge – Send same t and rt – If T=t0, response same like before. – If T=t1, response will be different. RFID Protocols & privacy for RFID protocols
  • 24. Learning – Send query to the tag T0 with random values rt repeatedly, causing tag to update its value to well in future. Challenge – Passive Role – Execute Query to see if reader accepts the tag as valid. If not, then the adversary knows this is the marked tag. – Conflict of view RFID Protocols & privacy for RFID protocols
  • 25. RFID Protocols & privacy for RFID protocols
  • 26. RFID Protocols & privacy for RFID protocols
  • 27. RFID Protocols & privacy for RFID protocols
  • 28. RFID Protocols & privacy for RFID protocols
  • 29. Protocol modification to analyze if the current tag counter differ more than d from the previous counter. Slowing rate of the responses RFID Protocols & privacy for RFID protocols
  • 30. RFID Protocols & privacy for RFID protocols
  • 31. RFID Protocols & privacy for RFID protocols
  • 32. A Zero Knowledge RFID protocol RFID Protocols & privacy for RFID protocols
  • 33. Vulnerability in ZK with Shared Keys Repairing ZK Power analysis attack [14] Logical layer silence does not imply RF silence. RFID Protocols & privacy for RFID protocols
  • 34. Deterministic Hash lock Randomized Hash lock RFID Protocols & privacy for RFID protocols
  • 35. Challenge: nonceR response RFID Protocols & privacy for RFID protocols
  • 36. No replay attack . Like OSK/AO, the tag does not store internal state on nonceR. No counter or timestamp that can be manipulated like YA-TRAP. It always yeild output unlike ZK. RFID Protocols & privacy for RFID protocols
  • 37. 1. G Tsudik , YA-TRAP: Yet another trivial RFID authentication protocolWorkshops, 2006. PerCom Workshops 2006. 2. C Chatmon, T van Le and M Burmester , secure anonymous rfid authentication protocol Florida State University, 2006 3. Engberg, S.J. and Harning, M.B. and Jensen, C.D., ero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience, Second Annual Conference on Privacy, Security, and Trust , 2004. 4. M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic approach to privacy- friendly tags. In RFID Privacy Workshop, MIT, USA, 2003. 5. G Avoine and P Oechslin , A scalable and provably secure Hash-based RFID Protocol, Third IEEE International Conference on Pervasive Computing and Communications Workshops, 2005. 6. S Weis, S Sarma, R Rivest, D Engels , Security and privacy aspects of low-cost radio frequency identification systems Security in Pervasive Computing, 2004 RFID Protocols & privacy for RFID protocols
  • 38. 7. M Burmester, T Van Le, B De Medeiros , Provably secure ubiquitous systems: Universally composable RFID authentication protocol, Securecomm and Workshops, 2006 8. A.Herzberg, H.Krawczyk and G.Tsudil, On Travaling Incognito, IEE workshop on Mobile Systems and Applications, December 1994. 9. F. Khan, Can Zero-Knowledge tags protect privacy, RFID Journal, 2005. 10. SC Kim, SS Yeo and S Kim, MARP: Mobile agent for rfid privacy protection, Smart Card Research and Advanced Applications – Springer 11. CC Tan, B Sheng, and Q Li, Severless search and authentication protocols for RFID, IEEE transactions on wireless communications, 2008 . 12. M Conti, RD Pietro, LV Mancini, RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward SecrecyA Spognardi - Pervasive Computing and Communications workshop, 2007 13. A Juels, SA Weis -, Defining Strong privacy for RFID, ACM Transactions on Information and System 2009 14. Khaled Ouafi and Raphael C. –W. Phan, Privacy of Recent RFID Authentication Protocols, Information Security Practice and Experience, 2008 - Springer RFID Protocols & privacy for RFID protocols