9 research outputs found
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term Internet of Things (IoT) expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and the privacy of a new RFID authentication protocol proposed by Shi et al. in 2014. We prove that although Shi et al. have tried to present a secure and untraceable authentication protocol, their protocol still suffers from several security and privacy weaknesses which make it vulnerable to various security and privacy attacks. We present our privacy analysis based on a well-known formal privacy model which is presented by Ouafi and Phan in 2008. Moreover, to stop such attacks on the protocol and increase the performance of Shi et al.’s scheme, we present some modifications and propound an improved version of the protocol. Finally, the security and the privacy of the proposed protocol were analyzed against various attacks
Privacy-Aware Authentication in the Internet of Things
Besides the opportunities o ered by the all-embracing Internet of Things (IoT) technology, it also poses a tremendous threat to the privacy of the carriers of these devices. In this work, we build upon the idea of an RFID-based IoT realized by means of standardized and well-established Internet protocols. In particular, we demonstrate how the Internet Protocol Security protocol suite (IPsec) can be applied in a privacy-aware manner. Therefore, we introduce a privacy-aware mutual authentication protocol compatible with restrictions imposed by the IPsec standard and analyze its privacy and security properties. In order do so, we revisit and adapt the RFID privacy model (HPVP) of Hermans et al. (ESORICS\u2711). With this work, we show that privacy in the IoT can be achieved without relying on proprietary protocols and on the basis of existing Internet standards
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT
Recently, Radio Frequency Identification (RFID) and Near Field Communication systems are found in various user-friendly services that all of us deal with in our daily lives. As these systems are ubiquitously deployed in different authentication and identification applications, inferring information about our behavior will be possible by monitoring our use of them. In order to provide privacy and security requirements of RFID users in novel authentication applications, lots of security schemes have been proposed which have tried to provide secure and untraceable communication for end-users. In this paper, we investigate the privacy of three RFID security schemes which have been proposed recently. For privacy analysis, we use the well-known RFID formal privacy model proposed by Ouafi and Phan. We show that all the studied protocols have some privacy drawbacks, making them vulnerable to various traceability attacks. Moreover, in order to overcome all the reported weaknesses and prevent the presented attacks, we apply some modifications in the structures of the studied protocols and propose an improved version of each one. Our analyses show that the modified protocols are more efficient than their previous versions and new modifications can omit all the existing weaknesses on the analyzed protocols. Finally, we compare the modified protocols with some new-found RFID authentication protocols in the terms of security and privacy
Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols
Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks (2016). We show that none of the studied protocols provides the desired security and privacy required by the end-users. We present various security and privacy attacks such as secret parameter reveal, impersonation, DoS, traceability, and forward traceability against the studied protocols. Our attacks are mounted in the Ouafi–Phan RFID formal privacy model which is a modified version of the well-known Juels–Weis privacy model
Hardware design of cryptographic algorithms for low-cost RFID tags
Mención Internacional en el tÃtulo de doctorRadio Frequency Identification (RFID) is a wireless technology for automatic identification that has experienced a notable growth in the last years. RFID is an important part of the new trend named Internet of Things (IoT), which describes a near future where all the objects are connected to the Internet and can interact between them. The massive deployment of RFID technology depends on device costs and dependability. In order to make these systems dependable, security needs to be added to RFID implementations, as RF communications can be accessed by an attacker who could extract or manipulate private information from the objects. On the other hand, reduced costs usually imply resource-constrained environments.
Due to these resource limitations necessary to low-cost implementations, typical cryptographic primitives cannot be used to secure low-cost RFID systems. A new concept emerged due to this necessity, Lightweight Cryptography. This term was used for the first time in 2003 by Vajda et al. and research on this topic has been done widely in the last decade. Several proposals oriented to low-cost RFID systems have been reported in the literature. Many of these proposals do not tackle in a realistic way the multiple restrictions required by the technology or the specifications imposed by the different standards that have arose for these technologies. The objective of this thesis is to contribute in the field of lightweight cryptography oriented to low-cost RFID tags from the microelectronics point of view.
First, a study about the implementation of lightweight cryptographic primitives is presented . Specifically, the area used in the implementation, which is one of the most important requirements of the technology as it is directly related to the cost. After this analysis, a footprint area estimator of lightweight algorithms has been developed. This estimator calculates an upper-bound of the area used in the implementation. This estimator will help in making some choices at the algorithmic level, even for designers without hardware design skills.
Second, two pseudo-random number generators have been proposed. Pseudorandom number generators are essential cryptographic blocks in RFID systems.
According to the most extended RFID standard, EPC Class-1 Gen-2, it is mandatory to include a generator in RFID tags. Several architectures for the two proposed generators have been presented in this thesis and they have been integrated in two authentication protocols, and the main metrics (area, throughput and power consumption) have been analysed.
Finally, the topic of True Random Number Generators is studied. These generators are also very important in secure RFID, and are currently a trending research line. A novel generator, presented by Cherkaoui et al., has been evaluated under different attack scenarios. A new true random number generator based on coherent sampling and suitable for low-cost RFID systems has been proposed.La tecnologÃa de Identificación por Radio Frecuencia, más conocida por sus siglas en inglés RFID, se ha convertido en una de las tecnologÃas de autoidentificación más importantes dentro de la nueva corriente de identificación conocida como Internet de las Cosas (IoT). Esta nueva tendencia describe un futuro donde todos los objetos están conectados a internet y son capaces de identificarse ante otros objetos. La implantación masiva de los sistemas RFID está hoy en dÃa limitada por el coste de los dispositivos y la fiabilidad. Para que este tipo de sistemas sea fiable, es necesario añadir seguridad a las implementaciones RFID, ya que las comunicaciones por radio frecuencia pueden ser fácilmente atacadas y la información sobre objetos comprometida. Por otro lado, para que todos los objetos estén conectados es necesario que el coste de la tecnologÃa de identificación sea muy reducido, lo que significa una gran limitación de recursos en diferentes ámbitos.
Dada la limitación de recursos necesaria en implementaciones de bajo coste, las primitivas criptográficas tÃpicas no pueden ser usadas para dotar de seguridad a un sistema RFID de bajo coste. El concepto de primitiva criptográfica ligera fue introducido por primera vez 2003 por Vajda et al. y ha sido desarrollado ampliamente en los últimos años, dando como resultados una serie de algoritmos criptográficos ligeros adecuados para su uso en tecnologÃa RFID de bajo coste. El principal problema de muchos de los algoritmos presentados es que no abordan de forma realista las múltiples limitaciones de la tecnologÃa. El objetivo de esta tesis es el de contribuir en el campo de la criptografÃa ligera orientada a etiquetas RFID de bajo coste desde el punto de vista de la microelectrónica.
En primer lugar se presenta un estudio de la implementación de las primitivas criptográficas ligeras más utilizadas, concretamente analizando el área ocupado por dichas primitivas, ya que es uno de los parámetros crÃticos considerados a la hora de incluir dichas primitivas criptográficas en los dispositivos RFID de bajo coste. Tras el análisis de estas primitivas se ha desarrollado un estimador de área para algoritmos criptográficos ultraligeros que trata de dar una cota superior del área total ocupada por el algoritmo (incluyendo registros y lógica de control). Este estimador permite al diseñador, en etapas tempranas del diseño y sin tener ningún conocimiento sobre implementaciones, saber si el algoritmo está dentro de los lÃmites de área mpuestos por la tecnologÃa RFID.
También se proponen 2 generadores de números pseudo-aleatorios. Estos generadores son uno de los bloques criptográficos más importantes en un sistema RFID. El estándar RFID más extendido entre la industria, EPC Class-1 Gen-2, establece el uso obligatorio de dicho tipo de generadores en las etiquetas RFID. Los generadores propuestos han sido implementados e integrados en 2 protocolos de comunicación orientados a RFID, obteniendo buenos resultados en las principales caracterÃsticas del sistema.
Por último, se ha estudiado el tema de los generadores de números aleatorios. Este tipo de generadores son frecuentemente usados en seguridad RFID. Actualmente esta lÃnea de investigación es muy popular. En esta tesis, se ha evaluado la seguridad de un novedoso TRNG, presentado por Cherkaoui et al., frente ataques tÃpicos considerados en la literatura. Además, se ha presentado un nuevo TRNG de bajo coste basado en la técnica de muestreo por pares.Programa Oficial de Doctorado en IngenierÃa Eléctrica, Electrónica y AutomáticaPresidente: Teresa Riesgo Alcaide.- Secretario: Emilio OlÃas Ruiz.- Vocal: Giorgio di Natal
Recommended from our members
A Novel Long-Range Passive UHF RFID System over Twisted-pair Cable
Radio Frequency Identification (RFID) is one of the most representative, rapidly growing, and highly extendable technologies, which uses electromagnetic waves in accordance with specific communications standards and regulations to identify, track, or even localise desired objects. However, due to its high cost, limited read range, and uncertain reliability, its adoption still lags, especially in large-scale organisations. Even though an RFID distributed antenna system (DAS) can greatly improve the detection range and read rate of a single reader when system uses different combinations of antenna states with frequency and phase hopping, the lossy and heavy coaxial cables between reader and antennas still limits the system coverage and design flexibility for wide-area passive UHF RFID applications.
In order to develop a cost-efficient and flexibly-installed passive RFID DAS, a novel large-range passive UHF RFID system over twisted-pair cable is proposed in this dissertation. This new system consists of one baseband central controller and one antenna subsystem, connected by a commonly used twisted-pair cable. It is shown that transmitting/receiving low frequency baseband signals over a twisted-pair cable can significantly reduce cable attenuation and extend the communication distance. A simulation is conducted to demonstrate that frequency and phase hopping can also be remotely controlled to fit this system structure by slightly varying the frequency or phase of the input reference signal of the frequency synthesis system. The features of twisted-pair cable in terms of its low cost, light weight, and bend radius greatly improve the design and installation flexibility of an RFID system.
The implemented system is designed based on the ISO 18000-6C and EPC Class 1 Generation 2 standards, and can operate according to FCC (902-928 MHz) and ETSI (865-868MHz) regulations. The results of the measurement show the reader can achieve a sensitivity of - 94.5 dBm over 30 m Cat5e cable, and its sensitivity can still remain at around -94.2 dBm over 150 m Cat5e cable. The experimental results of tag detection show that the passive tags can be successfully detected over a 6 m wireless range following a 300 m of twisted-pair cable between the central controller and antenna. This detection range cannot be achieved by existing commercial RFID systems.
Since the transmission and reception in a RFID system are simultaneous, finite isolation of the circulator/directional coupler and environmentally dependent reflection ratio of the antenna lead to serious leakage problems. Leakage can directly cause sensitivity degradation due to saturation of the RF components. A fast leakage suppression block is developed in efforts to solve this problem. Measurements show that this new canceller can deliver an average suppression of 36.9 dB, and this excellent performance remains when the system uses frequency hopping. With help of an improved scanning algorithm, this canceller can find its optimal status within 38 ms, and this settling time is short enough for most commercial RFID readers. By reducing the number of voltage samples taken, the convergence time can be further improved.
To fully investigate this new passive UHF RFID system value, a comparison study between the new system and a commercial system is conducted. This new automatic passive UHF RFID system is confirmed to deliver high performance long-range passive tag detection. Particular advantages are shown in the fast tag read rate and capability of uplink SNR improvement. This novel system is also superior to conventional RFID systems in terms of link distance, link cost, and installation flexibility
Intelligent Sensor Networks
In the last decade, wireless or wired sensor networks have attracted much attention. However, most designs target general sensor network issues including protocol stack (routing, MAC, etc.) and security issues. This book focuses on the close integration of sensing, networking, and smart signal processing via machine learning. Based on their world-class research, the authors present the fundamentals of intelligent sensor networks. They cover sensing and sampling, distributed signal processing, and intelligent signal learning. In addition, they present cutting-edge research results from leading experts