6.857: RFID Security and Privacy: November 2, 2004
6.857: RFID Security and Privacy: November 2, 2004
What is RFID?
Radio Frequency Identification: Identify
physical objects through a radio interface.
Many different technologies called RFID.
Others types of auto-ID systems include:
Optical barcodes
Radiological tracers
Chemical taggants
An RFID
Smart Shelf
Reader
System Interface
Network
Reader
Data
Processing
Reader
01.203D2A.916E8B.8719BAE03C
Tag
Database
6.857 Lecture - November
2, 2004
RFID History
Earliest Patent: John Logie Baird (1926)
Identify Friend or Foe (IFF) systems developed
by the British RAF to identify friendly aircraft.
Both sides secretly tracked their enemys IFF.
How do you identify yourself only to your friends?
Dont shoot! Were British!
Digression #1:
Related Military Applications
IFF still used today for aircraft and
missiles. Obviously classified.
Could envision an IFF system for soldiers.
Lots of military interest in pervasive
networks of cheap, RFID-like sensors.
Monitoring pipelines, detecting biological
agents, tracking munitions, etc.
6.857 Lecture - November
2, 2004
Commercial Applications
Early Applications:
Tracking boxcars and shipping containers.
Cows: RFID ear tags.
Bulky, rugged, and expensive devices.
Supply-Chain Management
(Not Gum)
Semi-Passive:
Tags have an on-board power source (battery).
Cannot initiate communications, but can be sensors.
Longer read range, more cost for battery.
Active:
On-board power and can initiate communications.
6.857 Lecture - November
2, 2004
Functionality Classes
Class Nickname
Memory
Power
Source
Anti-Shoplift
Tags
None
Passive
Article Surveillance
Electronic
Product Code
Read-Only
Passive
Identification Only
Electronic
Product Code
Read/Writ
e
Passive
Data Logging
Sensor Tags
Read/Writ
e
Semi-Passive Environmental
Sensors
Smart Dust
Read/Writ
e
Active
Features
Ad Hoc Networking
Operating Frequencies
Range Class
LF
HF
UHF
Frequency
Range
120-140 MHz
13.56 MHz
868-956 MHz
Maximum
Range?
3 meters
3 meters
10 meters
Typical Range
10-20
centimeters
10-20
centimeters
3 meters
Asymmetric Channels
Reader
Tag
Eavesdropper
Personal Privacy
Leaking of personal information
(prescriptions, brand of underwear, etc.).
Location privacy: Tracking the physical
location of individuals by their RFID tags.
6.857 Lecture - November
2, 2004
Adversarial Model
Can classify adversaries by their access.
Three levels of read or write access:
Physical: Direct access to physical bits.
Logical: Send or receive coherent messages.
Signal: Detect traffic or broadcast noise.
Tag Manufacture/Cloning:
No Read Access/Physical Read Access.
Physical Write Access.
Adversarial Model:
Countermeasures
Countermeasures will degrade an
adversarys access. For example:
Encryption degrades logical read access
to signal read access.
Authentication degrades logical write to
signal write access.
Tamper resistance can degrade physical
read to logical read access.
6.857 Lecture - November
2, 2004
Digression #2:
RFID Public Relations
The industry never misses a chance to
shoot itself in the foot.
Track anything, anywhere.
Wal-Mart Caught Conducting Secret
Human Trials Using Alien Technology!
Lesson: If you dont want people to
negatively spin your technology, dont
make their jobs easier.
6.857 Lecture - November
2, 2004
Security Challenge
Resources, resources, resources.
EPC tags ~ 5 cents. 1000 gates ~ 1 cent.
Main security challenges come from
resource constraints.
Gate count, memory, storage, power, time,
bandwidth, performance, die space, and
physical size are all tightly constrained.
Pervasiveness also makes security hard.
6.857 Lecture - November
2, 2004
of
volatile
read-write
Resource Constraints
With these constraints, modular math
based public-key algorithms like RSA or
ElGamal are much too expensive.
Alternative public-key cryptosystems like
ECC, NTRU, or XTR are too expensive.
Symmetric encryption is also too costly.
We cant fit DES, AES, or SHA-1 in 2000
gates.
(Recent progress made with AES.)
6.857 Lecture - November
2, 2004
Hash Locks
Rivest, Weis, Sarma, Engels (2003).
Access control mechanism:
Authenticates readers to tags.
Tag
Who
are you?
metaID
Store metaID
metaID
key
metaID = hash(key)?
Hi, my name is..
Querying
Unlocking
Locking
a locked
a atag
tagtag
Tag: IDk
Query?
R,hash(R, IDk)
Unlocking a tag
Select random R
Blocker Tags
Juels, Rivest, Szydlo (2003).
Consumer Privacy Protecting Device:
Hides your tag data from strangers.
Other Work
Efficient Implementations for RFID:
Feldhofer, Dominikus, and Wolkerstorfer.
Gaubatz, Kaps, and Yksel.
Secure Protocols:
Ari Juels.
Inoue and Yasuura
Gildas Avoine.
Privacy Issues:
Molnar and Wagner.
Henrici and Mller.
Limited Bibliography:
crypto.csail.mit.edu/~sweis/rfid/
RFID Policy
Questions?