modelling privacy for off-line rfid systems

21
Modelling Privacy for Off-line RFID Systems Flavio Garcia Radboud University Nijmegen together with Peter van Rossum RFIDSec 2009

Upload: asa

Post on 24-Feb-2016

31 views

Category:

Documents


0 download

DESCRIPTION

Modelling Privacy for Off-line RFID Systems. Flavio Garcia Radboud University Nijmegen together with Peter van Rossum RFIDSec 2009. Outline. Current RFID privacy models A new model for off-line RFID systems that considers reader corruption Forward and self-stabilizing backwards privacy - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Modelling Privacy for Off-line RFID Systems

Modelling Privacy for Off-line RFID Systems

Flavio GarciaRadboud University Nijmegen

together with Peter van RossumRFIDSec 2009

Page 2: Modelling Privacy for Off-line RFID Systems

Outline

• Current RFID privacy models• A new model for off-line RFID systems that

considers reader corruption• Forward and self-stabilizing backwards privacy• Protocols• Conclusions

Page 3: Modelling Privacy for Off-line RFID Systems

RFID Systems

Page 4: Modelling Privacy for Off-line RFID Systems

Current RFID Models

Permanent secure

connexion

• Juels and Weis (2006)• Vaudenay (2007)•Avoine (2005)

Fwd-Privacy

Page 5: Modelling Privacy for Off-line RFID Systems

Fwd-Privacy

Safe Un-SafeTime

Page 6: Modelling Privacy for Off-line RFID Systems

Narrow-FWD Private protocol [OSK03]

Page 7: Modelling Privacy for Off-line RFID Systems

Many real systems are more complex

Periodicconnexion

What kind of security can still be

guaranteed?

More information

on the readers

Page 8: Modelling Privacy for Off-line RFID Systems

Consider off-line systems where readers can be compromised

Page 9: Modelling Privacy for Off-line RFID Systems

An adversary is a PPTA with access to the set of oracles O:

• CreateReader(R)• CreateTag(T)• Launch(R)• Send(m,A)• Result()• CorruptTag(T)• Sync()O+ = O {DestroyReader(R)}

Page 10: Modelling Privacy for Off-line RFID Systems

Fwd and Bwd-Privacy

Safe Un-Safe

Unachievable!

(Unless extra assumptions are made)

Safe

Page 11: Modelling Privacy for Off-line RFID Systems

Forward privacy

Page 12: Modelling Privacy for Off-line RFID Systems

Self-stabilizing backwards privacy

Page 13: Modelling Privacy for Off-line RFID Systems

Forward and Self-stabilizing Backwards Private Protocol (idea)

new day!BO

K ← h(k’+1)K’ ← h(k’)

K ← h(k)K ← h(k)

MAC using k’K to `talk’ with the readerK’ to `talk’ with the BO

Page 14: Modelling Privacy for Off-line RFID Systems

Forward and Self-stabilizing Backwards Private Protocol

Page 15: Modelling Privacy for Off-line RFID Systems

Forward and Self-stabilizing Backwards Private Protocol

Page 16: Modelling Privacy for Off-line RFID Systems

Verify key update

Improvement

Page 17: Modelling Privacy for Off-line RFID Systems

Improving synchronization

Page 18: Modelling Privacy for Off-line RFID Systems

But still de-syncs if a reader is compromised

Almost there

Page 19: Modelling Privacy for Off-line RFID Systems

Improving synchronization

Page 20: Modelling Privacy for Off-line RFID Systems

What to do

Take special measures when a reader is compromised.

Only update k’’s in BO if no reader corruption

Con: this extends the privacy lost by one time slot

Page 21: Modelling Privacy for Off-line RFID Systems

Conclusions

• model for (off-line) RFID systems in the presence of reader corruption

• forward and self-stabilizing backwards private protocols that uses only hash functions.

• De-sync resilience