637 research outputs found

    Trusted and Privacy-preserving Embedded Systems: Advances in Design, Analysis and Application of Lightweight Privacy-preserving Authentication and Physical Security Primitives

    Get PDF
    Radio Frequency Identification (RFID) enables RFID readers to perform fully automatic wireless identification of objects labeled with RFID tags and is widely deployed to many applications, such as access control, electronic tickets and payment as well as electronic passports. This prevalence of RFID technology introduces various risks, in particular concerning the privacy of its users and holders. Despite the privacy risk, classical threats to authentication and identification systems must be considered to prevent the adversary from impersonating or copying (cloning) a tag. This thesis summarizes the state of the art in secure and privacy-preserving authentication for RFID tags with a particular focus on solutions based on Physically Unclonable Functions (PUFs). It presents advancements in the design, analysis and evaluation of secure and privacy-preserving authentication protocols for RFID systems and PUFs. Formalizing the security and privacy requirements on RFID systems is essential for the design of provably secure and privacy-preserving RFID protocols. However, existing RFID security and privacy models in the literature are often incomparable and in part do not reflect the capabilities of real-world adversaries. We investigate subtle issues such as tag corruption aspects that lead to the impossibility of achieving both mutual authentication and any reasonable notion of privacy in one of the most comprehensive security and privacy models, which is the basis of many subsequent works. Our results led to the refinement of this privacy model and were considered in subsequent works on privacy-preserving RFID systems. A promising approach to enhance the privacy in RFID systems without lifting the computational requirements on the tags are anonymizers. These are special devices that take off the computational workload from the tags. While existing anonymizer-based protocols are subject to impersonation and denial-of-service attacks, existing RFID security and privacy models do not include anonymizers. We present the first security and privacy framework for anonymizer-enabled RFID systems and two privacy-preserving RFID authentication schemes using anonymizers. Both schemes achieve several appealing features that were not simultaneously achieved by any previous proposal. The first protocol is very efficient for all involved entities, achieves privacy under tag corruption. It is secure against impersonation attacks and forgeries even if the adversary can corrupt the anonymizers. The second scheme provides for the first time anonymity and untraceability of tags against readers as well as secure tag authentication against collisions of malicious readers and anonymizers using tags that cannot perform public-key cryptography (i.e., modular exponentiations). The RFID tags commonly used in practice are cost-efficient tokens without expensive hardware protection mechanisms. Physically Unclonable Functions (PUFs) promise to provide an effective security mechanism for RFID tags to protect against basic hardware attacks. However, existing PUF-based RFID authentication schemes are not scalable, allow only for a limited number of authentications and are subject to replay, denial-of-service and emulation attacks. We present two scalable PUF-based authentication schemes that overcome these problems. The first protocol supports tag and reader authentication, is resistant to emulation attacks and highly scalable. The second protocol uses a PUF-based key storage and addresses an open question on the feasibility of destructive privacy, i.e., the privacy of tags that are destroyed during tag corruption. The security of PUFs relies on assumptions on physical properties and is still under investigation. PUF evaluation results in the literature are difficult to compare due to varying test conditions and different analysis methods. We present the first large-scale security analysis of ASIC implementations of the five most popular electronic PUF types, including Arbiter, Ring Oscillator, SRAM, Flip-Flop and Latch PUFs. We present a new PUF evaluation methodology that allows a more precise assessment of the unpredictability properties than previous approaches and we quantify the most important properties of PUFs for their use in cryptographic schemes. PUFs have been proposed for various applications, including anti-counterfeiting and authentication schemes. However, only rudimentary PUF security models exist, limiting the confidence in the security claims of PUF-based security mechanisms. We present a formal security framework for PUF-based primitives, which has been used in subsequent works to capture the properties of image-based PUFs and in the design of anti-counterfeiting mechanisms and physical hash functions

    J3Gen : a PRNG for Low-Cost Passive RFID

    Get PDF
    Pseudorandom number generation (PRNG) is the main security tool in low-cost passive radio-frequency identification (RFID) technologies, such as EPC Gen2. We present a lightweight PRNG design for low-cost passive RFID tags, named J3Gen. J3Gen is based on a linear feedback shift register (LFSR) configured with multiple feedback polynomials. The polynomials are alternated during the generation of sequences via a physical source of randomness. J3Gen successfully handles the inherent linearity of LFSR based PRNGs and satisfies the statistical requirements imposed by the EPC Gen2 standard. A hardware implementation of J3Gen is presented and evaluated with regard to different design parameters, defining the key-equivalence security and nonlinearity of the design. The results of a SPICE simulation confirm the power-consumption suitability of the proposal

    On two RFID privacy notions and their relations

    Get PDF

    Enhanced bidirectional authentication scheme for RFID communications in Internet of Things environment

    Get PDF
    Among the security issues in the environment of the Internet of things (IOT), the security of information source is a privilege to be concerned. To protect data collection and control devices in IOT, first of all, ones shall ensure the authenticity of information source. To address the uncertainty problem of information sources in IOT, identity authentication technology is essential. In this study, we suggested an enhanced bidirectional authentication scheme that is suitable for Radio Frequency Identification (RFID) communications among devices or between devices and control devices in an IOT environment. Specific improvement measures included three aspects: back-up terminals, a condition monitoring device to increase authentication properties, and an alarm mechanism. The enhanced bidirectional authentication protocol presented in this article has the characteristics of excellent performance in security and privacy protection, which could authenticate data contents, even positions and other data properties, and resist the replay or denial of service attacks; at the same time, it could overcome the defect of data asynchrony between the front end and the back end, providing users with excellent forward security. The simulation experiments showed that system reliability was greatly enhanced by adopting the proposed protocol

    Agency in the Internet of Things

    Get PDF
    This report summarises and extends the work done for the task force on IoT terminated in 2012. In response to DG CNECT request, the JRC studied this emergent technology following the methodologies pertaining to the Science and Technology Studies field. The aim of this document is therefore to present and to explore, on the basis of present day conceptions of relevant values, rights and norms, some of the “ethical issues” arising from the research, development and deployment of IoT, focusing on agency, autonomy and social justice. We start by exploring the types of imaginaries that seem to be entrenched and inspiring the developments of IoT and how they become portrayed in “normal” communication from corporations and promoters to the ordinary citizen (chapter 2). We report the empirical work we have conducted, namely the JRC contribution to the limited public debate initiated by the European Commission via the Your Voice portal during the Spring of 2012 (chapter 3) and an empirical exercise involving participants of two IoT conferences (chapter 4). This latter exercise sought to illustrate how our notions of goodness, trust, relationships, agency and autonomy are negotiated through the appropriation of unnoticed ordinary objects; this contributes to the discussion about ethical issues at stake with the emerging IoT vision beyond the right to privacy, data protection and security. Furthermore, based on literature review the report reflects on two of the main ethical issues that arise with the IoT vision: agency (and autonomy) and social justice (chapter 5), examining eventually governance alternatives of the challenged ethical issues (chapter 6).JRC.G.7-Digital Citizen Securit

    Optimal Supply Network with Vendor Managed Inventory in a Healthcare System with RFID Investment Consideration

    Get PDF
    Supply Chain Management in the healthcare sector faces several significant challenges, including complexity in healthcare systems, high supply chain costs, balancing quality and costs, delay in delivery, product availability from vendors, inventory waste, and unpredictability and uncertainty. Among those challenges, having an effective inventory management system with an optimal supply network is important to improve the match between supply and demand, which would improve the performance of for healthcare firms. Vendor Managed Inventory (VMI) system is a replenishment solution in which the vendor monitors and decides the time and the quantity of the inventory replenishment of their customers subject to their demand information exchange. A VMI contract in the location-inventory assignment problem is a decision tool for management in the healthcare industry, in which it enables the management to have a cost and service effective decision tool to critically re-evaluate and examine all areas of operations in a SC network looking for avenues of optimization. This dissertation is based on a real-world problem arising from one of the world\u27s leading medical implant supply company applied to a chain of hospitals in the province of Ontario. The chain of hospitals under study consists of 147 hospitals located in Ontario, Canada. The vendor is a supplier of three types of medical implants (a heart valve, an artificial knee, and a hip). In Chapter 2 of this dissertation, we present an optimal supply healthcare network with VMI and with RFID consideration, in which we shed light on the role of the VMI contract in the location-inventory assignment problem and integrate it with both the replenishment policy assignment and the Radio Frequency Identification (RFID) investment allocation assignment in healthcare SC networks using both VMI and direct delivery policies. A numerical solution approach is developed in the case of the deterministic demand environment, and we end up with computational results and sensitivity analysis for a real-world problem to highlight the usefulness and validate the proposed model. We extend our research of integrating the VMI contract in the location-inventory assignment problem with the replenishment policy assignment under a deterministic demand environment to include the stochastic demand environment. The impact of the uncertainty of the demand as a random variable following two types of distributions, normal and uniform distributions, is studied in Chapter 3. Motivated by the lack of investigations and comparative studies dealing with the preference of dealing with VMI contracts to other traditional Retailer Managed Inventory (RMI) systems, we provide in Chapter 4 of this dissertation a comparative study in which we compare the total cost of the VMI system with another two situations of traditional RMI systems: first, a traditional RMI system with a continuous replenishment policy for all hospitals and with assigned storage facilities and second, a traditional RMI system with a direct delivery policy for all hospitals without assigning a storage facility. Computational results, managerial insights, sensitivity analysis, and solution methodologies are provided in this dissertation. Keywords: Vendor Managed Inventory, healthcare system, location-inventory, RFID technology, supply-chain network, stochastic demand, location-inventory assignment problem, and retailer managed Inventory
    • …
    corecore