Top Banner
Privacy Challenges in RFID Gildas Avoine Information Security Group Universit´ e catholique de Louvain Belgium
32

Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Apr 09, 2018

Download

Documents

lamkiet
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Privacy Challenges in RFID

Gildas Avoine

Information Security Group

Universite catholique de Louvain

Belgium

Page 2: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

SUMMARY

Background about RFID

Privacy: Information Leakage

Privacy: Malicious Traceability

Is Privacy a Research Challenge?

Page 3: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

BACKGROUND ABOUT RFID

Background about RFID

Privacy: Information Leakage

Privacy: Malicious Traceability

Is Privacy a Research Challenge?

Page 4: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

DefinitionsTechnical View

Radio Frequency IDentification (RFID) consists in remotelyretrieving datas (identifier and potentially additional datas) usingdevices called RFID tags.

An RFID tag contain a microcircuit (chip) and an antenna toenable it to receive and respond to radio-frequency queries froman RFID reader/writer.

An RFID tag can be a low-capability device e.g. for petidentification, but also a powerful contactless smartcard e.g. forbiometric passports.

Cre

dit

:G

ildas

Avo

ine

Gildas Avoine Privacy Challenges in RFID 4

Page 5: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Architecture

Reader

Tag

Reader

TagTag

TagBack-endSystem

Gildas Avoine Privacy Challenges in RFID 5

Page 6: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

RFID ApplicationsBasic Applications

www.aeroid.co.uk

www.rfid-library.com

www.flickr.com

www.safetzone.com

Supply chain tracking.

◦ Track boxes, palettes, etc.

Libraries.

◦ Improve book borrowing and inventories.

Pet identification.

◦ Replace tattoos by electronic ones.◦ ISO11784, ISO11785.

Localisation.

◦ Children in amusement parks, Elderly people.◦ Counting cattle.

Gildas Avoine Privacy Challenges in RFID 6

Page 7: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

RFID ApplicationsEvolved Applications

Credit: G. Avoine Credit: G. Avoine

www.carthiefstoppers.com

www.brusselnieuws.be

www.bajabeach.esblogs.e-rockford.com

Building access control.

◦ Eg. UCL, MIT.

Automobile ignition key.

◦ Eg. TI DST, Keeloq.

Public transportation.

◦ Eg. Brussels, Boston, Paris, ..., Thalys.

Payment.

◦ Eg. Visa, Baja Beach Club.

Electronic documents.

◦ Eg. ePassports.

Loyalty cards.

Gildas Avoine Privacy Challenges in RFID 7

Page 8: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Tag Characteristics

cost

power frequency

communication

standard

calculation

storage

active

passiveLF

HF

UHF

metersdm

cm

UID 1 KB 40 KB

nopwd

sym cryptoasym cryptoEPC

ISO14443

ISO15693

10 cents

50 cents

euros

Gildas Avoine Privacy Challenges in RFID 8

Page 9: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Security Specificities

Low capabilities.

Wireless.

Ubiquity.

Fast authentication.

Gildas Avoine Privacy Challenges in RFID 9

Page 10: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Security Threats Classification

Security.

◦ Impersonation.

◦ Denial of service.

Privacy.

◦ Information leakage.

◦ Malicious traceability.

Gildas Avoine Privacy Challenges in RFID 10

Page 11: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Research fields about RFID Privacyhttp://www.avoine.net/rfid/

Privacy models.

Untraceable (lightweight) protocols.

Untraceable (scalable) protocols.

Counterfeiting.

Grouping Proof.

Ownership transfer.

Applications: ePassport, pacemakers, etc.

Gildas Avoine Privacy Challenges in RFID 11

Page 12: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

PRIVACY: INFORMATION LEAKAGE

Background about RFID

Privacy: Information Leakage

Privacy: Malicious Traceability

Is Privacy a Research Challenge?

Page 13: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Importance of Avoiding TraceabilityOther Technologies

Differences between RFID and the other technologies eg. video,credit cards, GSM, Bluetooth.

◦ Tags cannot be switched-off.

◦ Passive tags answer without the agreement of their bearers.

◦ Easy to analyze the logs of the readers.

◦ Increasing of the communication range.

◦ Tags can be almost invisible.

Gildas Avoine Privacy Challenges in RFID 13

Page 14: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Importance of Avoiding TraceabilityLiberty Rights Organizations

Even if you do not think that privacy is important, some peoplethink so and they are rather influential (CASPIAN, FoeBud,...).

Gildas Avoine Privacy Challenges in RFID 14

Page 15: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

European Commission

Member States should ensure that operators (...) conduct anassessment of the implications of the application implementationfor the protection of personal data and privacy, includingwhether the application could be used to monitor an individual.

Because of its potential to be both ubiquitous and practicallyinvisible, particular attention to privacy and data protectionissues is required in the deployment of RFID. Consequently,privacy and information security features should be built intoRFID applications before their widespread use (principle ofsecurity and privacy by design).

[Viviane Reding, EC Recommendation, 12.5.2009]

Gildas Avoine Privacy Challenges in RFID 15

Page 16: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Importance of Avoiding TraceabilityAnne Cavioukan

“Privacy and Security must be built in from the outset, at thedesign Stage”.

[Privacy Guidelines for RFID Information Systems, 2006, AnneCavioukan, Information and Privacy Commissioner of Ontario]

Gildas Avoine Privacy Challenges in RFID 16

Page 17: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Importance of Avoiding TraceabilityPalliative Solutions

Kill-command (Eg.: EPC Gen 2 requires a 32-bit kill command.)

Faraday cages.

Blocker tags.

Bill of Rights.

Removable antenna.

◦ US Patent 7283035 - RF data communications device withselectively removable antenna portion and method.

Tag must be pressed (SmartCode Corp.).

www.idstronghold.com

Gildas Avoine Privacy Challenges in RFID 17

Page 18: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Classification

Information meaningful by itself.

Information meaningful with the database.

Gildas Avoine Privacy Challenges in RFID 18

Page 19: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Information Meaningful by ItselfTypical Examples

Information leakage appears when the data sent by the tagreveals information intrinsic to the marked object or the holderof the object.

◦ Tagged books in libraries.

◦ Tagged pharmaceutical products, as advocated be the US. Foodand Drug Administration.

◦ E-documents (passports, ID cards, etc.).

◦ Loyalty cards, Public transportation passes.

Gildas Avoine Privacy Challenges in RFID 19

Page 20: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Information Meaningful by ItselfAri Juels’s Famous Picture

500 Eurosin wallet

Serial numbers:597387,389473…

Wig model #4456 (cheap polyester)

30 items of lingerie

Das Kapital and Communist­party 

handbook

Replacement hipmedical part

#459382

Credit: Ari Juels

Gildas Avoine Privacy Challenges in RFID 20

Page 21: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Information Meaningful by ItselfPublic Transportation: MOBIB Card in Brussels

MOBIB card (RFID) launched in Brussels in 2008.

Before getting in a subway, bus or tram, customers are requiredto show up their MOBIB card in front of a validator.

MOBIB is Calypso technology.

MOBIB cards are rather powerful RFID tags that embedcryptographic mechanisms to avoid impersonation or cloning.

Personal data are stored in the clear in the card: name,birthdate, zipcode.

Information about 3 last validations: date, time, bus line, busstop, subway station, ...

Gildas Avoine Privacy Challenges in RFID 21

Page 22: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Information Meaningful with a DatabaseAri Juels’s Famous Picture

55542390

41126751

09840921

54872164

93479122

Credit: Inspired by Ari Juels

Gildas Avoine Privacy Challenges in RFID 22

Page 23: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Information Meaningful with a DatabaseABIEC Information Leakage

Gildas Avoine Privacy Challenges in RFID 23

Page 24: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

PRIVACY: MALICIOUS TRACEABILITY

Background about RFID

Privacy: Information Leakage

Privacy: Malicious Traceability

Is Privacy a Research Challenge?

Page 25: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Privacy: Malicious TraceabilityInformal Definition

An adversary should not be able to track a tag holder, ie. heshould not be able to link two interactions tag/reader.

Eg. tracking of employees by the boss, tracking of children in anamusement park, tracking of military troops, etc.

Gildas Avoine Privacy Challenges in RFID 25

Page 26: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Privacy: Malicious TraceabilityTracking through the Layers

The main concepts of cryptography, i.e. confidentiality, integrity,and authentication, are treated without any practicalconsiderations.

If one of these properties is theoretically ensured, it remainsensured in practice whatever the layer we choose to implementthe protocol.

Privacy needs to be ensured at each layer: All efforts to preventtraceability in the application layer may be useless if no care istaken at the lower layers.

Gildas Avoine Privacy Challenges in RFID 26

Page 27: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Privacy: Malicious TraceabilityTraceability Through the Layers

Application Layer

Communication Layer

Physical Layer

Authentication / Identification.

Collision-avoidance.

Radio fingerprints.

Diversity of standards.

Gildas Avoine Privacy Challenges in RFID 27

Page 28: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Privacy: Malicious TraceabilityApplication Layer

Reader (list of keys) Tag (key k)

r

−−−−−−−−−−−−−−−→

ID,Ek(r , r′)

←−−−−−−−−−−−−−−−

This protocol is not privacy-friendly because the ID is revealed.

CR protocols avoiding malicious traceability do not scale well.

◦ Authenticating one tag requires O(n) operations.

Gildas Avoine Privacy Challenges in RFID 28

Page 29: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Privacy: Malicious TraceabilitySummary

In the physical layer.

◦ Hard to avoid malicious traceability, but tracking one tag is farfrom being easy in practice.

In the communication layer.

◦ Malicious traceability is usually do-able in practice.

◦ Can be avoided if a cryptographically-secure PRNG is used.

In the application layer.

◦ Malicious traceability can be avoided but challenge-responseprotocols do not scale well.

Gildas Avoine Privacy Challenges in RFID 29

Page 30: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

IS PRIVACY A RESEARCH CHALLENGE?

Background about RFID

Privacy: Information Leakage

Privacy: Malicious Traceability

Is Privacy a Research Challenge?

Page 31: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

Research Challenge

There are clearly privacy issues in RFID systems

Is privacy still a meaningful concept nowadays?

We already lost the control of our privacy.

People no longer care about privacy (vote...)

There is no business model behind privacy.

We could have privacy if it was free.

Privacy never comes for free.

All existing works on RFID privacy are practically useless.

Consider privacy with a larger view.

Do not try to get the best.

Find some metrics to privacy.

Enforce privacy using certifications.

Gildas Avoine Privacy Challenges in RFID 31

Page 32: Gildas Avoine Information Security Group Universit e ...deic.uab.cat/conferences/dpm/dpm2011/program/slides/Avoine_Setop... · Gildas Avoine Information Security Group Universit e

ConclusionGoing Further

http://sites.uclouvain.be/security/[email protected]

Gildas Avoine Privacy Challenges in RFID 32