Top Banner
Foundations of Privacy 2010 Guy Katz
43

Foundations of Privacy 2010 Guy Katz. Introduction to RFID How does it work Threats to user privacy Possible solutions.

Dec 22, 2015

Download

Documents

Margaret Haynes
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Foundations of Privacy 2010

Guy Katz

Page 2: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Introduction to RFID How does it work Threats to user privacy Possible solutions

Page 3: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.
Page 4: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

“Wireless” Identification System Consists of

◦ Tag Small transponder Attached to a physical object

◦ Transceiver Reads (writes) data from tags Connected to some database

Page 5: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

RFID has been around for 60 years◦ “Friend or Foe” systems in WW II:

German pilots would roll their planes when coming back to base

The British put basic transmitters on theirs Theft prevention (1970’s)

◦ Trucks in Los Alamos laboratory had transponders Toll payments Agriculture

Page 6: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

A large increase in deployment since year 2000

Reasons:◦ Tags and readers much smaller and cheaper◦ World wide standardization (ISO)

Page 7: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Supply Chain Management◦ From production to customer; replaces bar codes

Payment systems◦ Toll roads, cafeterias, Rav-Kav

Access Control◦ Weizmann Institute of Science

Theft Prevention Anti-Counterfeiting

◦ Passports, Money Bills Implanted Tags

Page 8: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.
Page 9: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Electronic Product Codes (RFID)

Barcodes

Read Rate High throughput. Multiple (>100) tags can be read simultaneously

Very low throughput. Tags can only be read manually, one at a time

Line of Sight Not required Definitely required

Durability Can even be internally attached

Easily damaged, swapped or removed; cannot be read if dirty or greasy

Human Capital Virtually none. Once up and running, the system is completely automated

Large requirements. Laborers must scan each tag

Event Triggering

Capable. Can be used to trigger certain events (like door openings, alarms, etc)

Not capable. Cannot be used to trigger events

Page 10: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.
Page 11: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Contain an antenna and a small circuit Purpose in life: broadcast an ID

◦ Usually 128 bits Very small - a few millimeters “Cost Barrier” – 5 cent per tag Two subgroups:

◦ Active Tags◦ Passive Tags

Integrated Circuit

4 x 4 mm

Page 12: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Can initiate communication on their own◦ Transmit, looking for a reader

Range can be over 100 meters Require a power source

◦ Consequently, expensive

Active RFIF TagPart of a monitoring system

6.5 x 4 x 2 cm

Page 13: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

No power source◦ Consequently, very cheap

Energy extracted from RF signal Can’t initiate communication on their own

◦ Need to receive energy before they can answer Range up to 10 meters

Page 14: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Power tags through RF signals Usually connected to

some database Singulation (Anti-Collision)

◦ Communicate with many tags at once Still a bit expensive

◦ Cheapest ones around 500$

Page 15: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

A method used by readers Goal: discover all present tags Difficulty: If many tags answer together,

answers get mixed up The reader can’t separate their answers

◦ Does know that more than one tag responded Need a way to solve collisions…

Page 16: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

The standard singulation protocol Each round, readers looks for a n-bit prefix

◦ Asks: “Who starts with 1010…?”◦ Tags answer with their next digit

If multiple tags answer, recurse on both (n+1) bits prefixes

For n tags and k identity bits, O(n*k) In practice, a few seconds for a shopping

cart

Page 17: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

0 1

0 1 1

0

0 1

010 011 101

Who has “ “?

010 011 101

Who has “1“?

101

Who has “10“?

101

Who has “0“?

011010

Who has “00“?Who has “01“?

011010

Page 18: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Various ranges◦ From 120 KHz to 10.6 GHz

Dictate passive read range◦ From 10cm to 10 meters, accordingly.

Can be used to ignore more distant tags

Page 19: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.
Page 20: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Sniffing/Eavesdropping Spoofing/Cloning Tracking Replay Denial Of Service

Not all attacks related to privacy!

Page 21: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Tags contain an identification code EPC usually consists of 64-128 bits

◦ Some bits indicate vendor and product ID◦ Others form a unique product ID

Tags becomes associated with a person!◦ Don’t even need to know item type

Page 22: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Reading is done silently and remotely Personal information can be gathered

◦ Information about individuals’ habits: where you go, what you buy…

◦ Physical tracking of people Military and Corporate Espionage

◦ Track down parts and components Implanted Tags

◦ Big Brother?

Page 23: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Need to keep the tags cheap A wide range of systems and uses

◦ No single solution suits everyone Need to only block malicious readings

Defining the typical adversary◦ What sort of equipment? Readers, tags, scanners,

etc…◦ What sort of abilities?

Can impersonate a reader? Connect to the DB?◦ Always present?

Page 24: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.
Page 25: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

We focus on EPC (Electronic Product Code) RFID tags

Goal: prevent the adversary from associating a tag with a person

Page 26: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Physically prevent RFID tags from transmitting◦ Aluminum foil lined wallets◦ Special cases for smart passports

Take off covers when transmission needed Problem: only suitable for specific RFID tags

◦ Led lined supermarket bags? Commercial products

already available

Passport Case Available for 18$

Page 27: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Tags contain a “kill” command◦ A supermarket might disable tags on checkout

Zombie tags don’t answer readers Prevents association of people with their

tags◦ Covers most privacy concerns

Problems: ◦ Some applications need the tag alive

Alice’s milk carton Return products to stores Toll payment tags, implanted tags

Page 28: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

An approach proposed by Juels and Brainard (2004)

Tags broadcast a privacy bit – “its ok/not ok to read me”

Problem: readers may choose to obey policy◦ Corrupt readers risk being caught

How does the owner configure the tags? Naïve solution…

Page 29: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Cryptographic solutions inherently expensive◦ Require computational power◦ Require more memory◦ Sometimes require source of randomness

Three approaches have been proposed:◦ Hash-Lock ◦ Re-Encryption◦ Silent Tree Walking

So far, all too expensive to be practical◦ But we’ll have a look anyway…

Page 30: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Similar to a password A tag can be locked by a reader

◦ Locked tags don’t transmit until unlocked◦ Locked tags have an ID y◦ Can only be unlocked by x s.t. h(x) = y

h: standard one-way hash function The consumer knows x, can unlock at home When locked, cannot be associated with the

owner

Page 31: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Problems: ◦ Tags still need to calculate h(x)

Expensive…◦ Many tags, hard to manage◦ Consumer might not be aware of all the tags he’s

carrying

Page 32: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Mechanism to prevent counterfeiting of money bills

The idea:◦ Put an RFID tag inside the bill◦ Every bill has a unique ID◦ Encrypt the ID with a police public key◦ Periodically re-encrypt it

Can’t link different appearances of a given tag

Page 33: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Re-encryption done by external agents (in big stores, banks, etc)

Problems: ◦ Costly infrastructure◦ Burdensome process

Often need to re-encrypt People naturally lazy

◦ Unclear just how effective the process is

Page 34: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Readers use singulation protocols◦ Most common: Tree Walking

It is sufficient to eavesdrop the reader to identify the tag (up to last bit)

A reader transmits much louder◦ Can be “heard” from further away

The idea: encrypt the reader’s requests◦ Makes eavesdropping harder

Page 35: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Problem: How to encrypt?◦ Tags have limited resources and no randomness◦ Need a shared reader-tag key beforehand◦ Makes the system impractical

Still, might be useful combined with other solutions…

Page 36: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Using an exterior device to block tag readers

Enables a user to block the adversary◦ One blocker suffices for all tags ◦ Cheap

Same price as a tag Don’t have to change existing RFID tags Can turn off at home…

Page 37: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

The idea: disrupt the singulation protocol◦ Trick the reader - make it think all tags are

present◦ Makes reading useless

For instance, a tag that disrupts the tree walking algorithm◦ Always answers both 0 and 1

Might require two antennas◦ The reader doesn’t know which tags exist

Page 38: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

The blocker will disrupt any reading around it

Can be configured to only disrupt “private branches”◦ Specific ID’s defined as private◦ Readers have no right to read them…

Can change the tree walking algorithm to avoid unneeded queries

Page 39: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

1

0

0 1

010 011 101

Who has “ “?

010 011 101

Who has “1“?

101

Who has “10“?

101

Who has “0“?

011010

BlockerBlocks 0*Blocker

Blocks 0*

0

Who has “00“?

1

Who has “01“?

0 10 1

011010

Page 40: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

Can the blocker itself pose a privacy breech?◦ Can track a unique “private zone”◦ Allow only a few privacy policies?

Bob’s blocker may disrupt Alice’s readings◦ Can use a random “private zone” to avoid conflicts◦ Tradeoff with the previous bullet

Tailored for the tree walking algorithm◦ However, should be adjustable to any other

algorithm as well Can be used in Denial of Service attacks

Page 41: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

RFID is becoming cheap and widespread It can easily disclose private information Partial solutions:

◦ Physical blocks◦ Zombie tags◦ Privacy Bits

Encryption schemes are effective, but require expensive tags and infrastructure◦ Only suitable for specific cases

Blocker tags are a cheap, effective solution for EPC RFID tags

Page 42: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.
Page 43: Foundations of Privacy 2010 Guy Katz.  Introduction to RFID  How does it work  Threats to user privacy  Possible solutions.

“Squealing Euros: Privacy-Protection in RFID-Enabled Banknotes” by Juels and Pappu, 2003

“Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems” by Weis et al, 2003

“Selective Blocking of RFID Tags for Consumer Privacy” by Juels, Rivest & Szydlo, 2003

“RFID Privacy: An Overview of Problems and Proposed Solutions” by Garfinkel, Juels & Pappu, 2005

“RFID”, presentation by Alon Rosen