EPCglobal Network Security: Research Challenges and Solutions

13
EPCglobal Network Security: Research Challenges and Solutions Yingjiu Li Assistant Professor School of Information Systems Singapore Management University 1August 2008 @ National RFID Center

description

EPCglobal Network Security: Research Challenges and Solutions. Yingjiu Li Assistant Professor School of Information Systems Singapore Management University 1August 2008 @ National RFID Center. What is EPCglobal Network?. EPC and EPCglobal Network. Double-Edge Sword. - PowerPoint PPT Presentation

Transcript of EPCglobal Network Security: Research Challenges and Solutions

Page 1: EPCglobal Network Security: Research Challenges and Solutions

EPCglobal Network Security: Research Challenges and

Solutions

Yingjiu LiAssistant Professor

School of Information SystemsSingapore Management University

1August 2008 @ National RFID Center

Page 2: EPCglobal Network Security: Research Challenges and Solutions

2

What is EPCglobal Network?• EPC and EPCglobal Network

Page 3: EPCglobal Network Security: Research Challenges and Solutions

3

Double-Edge Sword• ID collection, track and trace, information sharing• Adversaries (passive, active, and physical)

– Eavesdropping– Masquerading– Replay– MITM– De-synchronization– Tag cloning– DoS– Side-channel attack– Physical attack

Page 4: EPCglobal Network Security: Research Challenges and Solutions

4

Major Security Requirements• Private identification, anti-tracking, secure information

sharing• Our focus: private ID and anti-tracking

– Strong, moderate, weak, null anti-tracking– Secure handover (ownership transfer)

Page 5: EPCglobal Network Security: Research Challenges and Solutions

5

Challenges in Protocol Design• Conflicting objectives with constraints

Security(private ID and anti-tracking)

Visibility (track and trace)

Efficiency (dynamic structure and massive data)

Cost

Page 6: EPCglobal Network Security: Research Challenges and Solutions

6

Technical Solutions• RFID privacy without ownership handover

– Overview of problems and proposed solutions (Garfinkel, Juels, and Pappu: S&P 05)

• RFID security in EPCglobal Network (RFID-enabled supply chain)– Private ID: encryption or keyed hash of ID– Anti-tracking: random numbers are used to generate

private ID– Secure ownership handover: key update with de-

synchronization resilience– Visibility: distributed or centralized– Efficiency: how to search DB to identify a tag (linear

or log-linear)– Low cost: thousands of gates with PRNG and hash

Page 7: EPCglobal Network Security: Research Challenges and Solutions

7

Solution 1: Protecting RFID Communications in Supply Chains (Li and Ding: ASIACCS 07)

Page 8: EPCglobal Network Security: Research Challenges and Solutions

8

Solution 2: RFID Tag Ownership Transfer (Song: RFIDSec 08)

Page 9: EPCglobal Network Security: Research Challenges and Solutions

9

Solution 3: Unidirectional Key Distribution Across Time and Space (Juels, Pappu, Parno: USENIX 08)

Secret sharing across space: a secret key is distributed across the tags in a pallet.

Secret sharing across time: a secret key is distributed across multiple pallets.

Page 10: EPCglobal Network Security: Research Challenges and Solutions

10

Solution 4: Dual Security Modes in RFID-Enabled Supply Chain Systems

Page 11: EPCglobal Network Security: Research Challenges and Solutions

11

Comparison of Typical Technical SolutionsAnti-tracking

Handover and visibility

Efficiency (tag search)

Cost (tag)

ASIACCS 07

Weak Distributed (EPC IS)

Batch process

Moderate

RFIDSec 08

Strong Distributed(EPC IS)

Tag by tag Moderate

USENIX 08

Null Distributed(EPC IS)

Decryption Low

Dual modes

Strong Centralized (EPC DS)

Switch Moderate

Page 12: EPCglobal Network Security: Research Challenges and Solutions

12

Future Direction• A security framework for EPCglobal network

– Access control, flow control, disclosure control, trust negotiation, key management, audit, visibility maintenance, query authentication at high level

– Secure RFID protocol at low level (covert channel)

– Ownership handover in between (key management)

Page 13: EPCglobal Network Security: Research Challenges and Solutions

13

Questions?

Please contact me at [email protected]