8/3/2019 Kaliski Wireless Security Wwc 2003
1/31
Wireless Security
When Things Really Get InterestingBurt Kaliski, RSA Laboratories
World Wireless Congress
May 28, 2003
8/3/2019 Kaliski Wireless Security Wwc 2003
2/31
Introduction
Cryptography plays a central rolein the wireless world
Emerging wireless world willrequire new types of security
One cryptographers perspectiveon interesting things to come
8/3/2019 Kaliski Wireless Security Wwc 2003
3/31
VPN
Todays Wired World
Po
rtal
https://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=y8/3/2019 Kaliski Wireless Security Wwc 2003
4/31
VPN
Po
rtal
Current Wireless World
The wireless world today and in the near future is
like the wired world
without as many wires.
https://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=y8/3/2019 Kaliski Wireless Security Wwc 2003
5/31
Interoperability Is the Driver
From a security perspective, wired and wirelessapplications & networks are mostly similar today
Voice
Web access
Games
Protocols are relatively similar as well, due tointeroperability requirements
W* Effect Considered Harmful (Rohit Khare, 1999)
8/3/2019 Kaliski Wireless Security Wwc 2003
6/31
Roaming Users & On-Line Identities
Users are increasingly mobile
20M WLAN adaptors projected to ship this year(Gartner)
1M WLAN access points (Yankee)
Identity management is a key enablerCollaboration solutions must integrate with identity
and access management so that security and
personalization context can follow users (Burton)
Liberty Alliance is one forum for this work andcurrently includes participation from many wirelessvendors
8/3/2019 Kaliski Wireless Security Wwc 2003
7/31
8/3/2019 Kaliski Wireless Security Wwc 2003
8/31
Solving Traditional Security Challenges
Many vendors including RSASecurity are working on thetraditional security challenges
Security solutions are critically
important to wireless technologytoday
But as a cryptography researcher,wireless technology tomorrow isconceptually interesting and is thefocus of this talk
8/3/2019 Kaliski Wireless Security Wwc 2003
9/31
Where No Wires Have Gone Before
Emergingwireless worldencompasses totally new applications& networks that are impractical withwires
Wireless security protocols will be newas well
8/3/2019 Kaliski Wireless Security Wwc 2003
10/31
VPN
Po
rtal
Emerging Wireless World
Emerging wireless world is unlike the wired
world
where no wires have gone before.
https://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=y8/3/2019 Kaliski Wireless Security Wwc 2003
11/31
A Proliferation of Devices
Enabled by wireless technologies, almostanything will soon be connected
Cameras
Sensors
Product tags
Currency
This presents new challenges in networkingand location privacy
8/3/2019 Kaliski Wireless Security Wwc 2003
12/31
Privacy Challenges
Anything connected can potentially betracked
Who should be able to track what?
Balancing business benefits and privacy
e.g., track the product in the store, but not onthe consumer
Cryptography offers new tradeoffs
8/3/2019 Kaliski Wireless Security Wwc 2003
13/31
Networking Challenges
Anything can be connected,
but to what?
Devices will need to connect toeach other and the network
througheach other But how can devices trust each
other to connect reliably?
Again new options from
cryptography
8/3/2019 Kaliski Wireless Security Wwc 2003
14/31
Two Recent Research Examples
Micropayments for multi-hop cellular networks
Privacy protection for RFID tags
Chip (IC)Antenna
https://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=y8/3/2019 Kaliski Wireless Security Wwc 2003
15/31
Micropayments for Multi-Hop CellularNetworks
Markus Jakobsson (RSA Labs), Jean-PierreHubaux and Levente Buttyn (Swiss FederalInst. of Tech.)
Presented at Financial Cryptography 03
www.markus-jakobsson.com
https://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=y8/3/2019 Kaliski Wireless Security Wwc 2003
16/31
Multi-Hop Cellular
Advantages of multi-hop cellular: Reduced energy consumption Reduced interference
Fewer base stations with increased coverage Ad hoc networking
https://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=y8/3/2019 Kaliski Wireless Security Wwc 2003
17/31
Encouraging Honesty
Honest mobile nodes will forward packets for oneanother
Cheaters will forward just for themselves
May be difficult to tell the difference
How can honesty be encouraged?
8/3/2019 Kaliski Wireless Security Wwc 2003
18/31
Solution: Micropayments
Attach micropaymentsto packets
cryptographic lottery tickets related to packet and
route
Honest nodes paid for winning tickets
or fixed amount based on claimed volume, with ticketsas evidence
Cheaters detected statistically
too many tickets as originator, not enough as forwarder
Micropayment schemes have been proposed formore general applications; this one is speciallyadapted to multi-hop
8/3/2019 Kaliski Wireless Security Wwc 2003
19/31
The Solution in a Nutshell
Attachpaymenttoken
Check if thetoken is awinning ticket
If so, file claim
Check token
If correct,deliver packet
Submitrewardclaims
Accountingandauditinginformation
Debit/credit accounts
Identifyirregularities
https://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=355856&a=c&width=77&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=yhttps://www.clipart.com/Main/signup/index?PRODUCT=AT_TIME_01&oid=689497&a=c&width=128&choose_prod=y8/3/2019 Kaliski Wireless Security Wwc 2003
20/31
Privacy Protection for RFID Tags
Ari Juels (RSA Labs), Ron Rivest (MIT)and Mike Szydlo (RSA Labs)
Preprint, May 2003
theory.lcs.mit.edu/~rivest
Chip (IC)
Antenna
8/3/2019 Kaliski Wireless Security Wwc 2003
21/31
What is an RFID Tag?
You probably own a few RFID tags
Contactless physical-access cards
Automated toll payment
Inventory tags
An RFID tag simply calls out its (unique) name or
static data at a range of several meters
74AB8
5F8KJ3
Plastic#3
8/3/2019 Kaliski Wireless Security Wwc 2003
22/31
An Impending Explosion of Tags
Gillette has just ordered 500,000,000 RFID tags
Roughly two for every inhabitant of U.S.
Smart shelf application
Auto-ID Center at MIT
Walmart, Gillette, etc.RFID tags as next generation barcodes
Inventory control
European Central Bank plans to implant RFID tags inbanknotes by 2005
Anti-counterfeitingTracking of illicit monetary flows
8/3/2019 Kaliski Wireless Security Wwc 2003
23/31
Other Applications
Prada, Soho NYC Personalize / accessorize
Recycling
Payment schemes
E.g., Mondex
Smart appliances House pets
8/3/2019 Kaliski Wireless Security Wwc 2003
24/31
500 Euros
in walletSerial numbers:597387,389473
Wigmodel #4456
(cheap polyester)
30 items
of lingerie
Das Capitaland
Communist-
party handbook
Replacement hipmedical part #459382
Without Privacy Protection
8/3/2019 Kaliski Wireless Security Wwc 2003
25/31
The Top Two Messages
Deployed navely, embedding of RFID tags presentsa serious danger to privacy.
The danger need not be quite so severe: There arereasonably practical ways to protect privacy.
8/3/2019 Kaliski Wireless Security Wwc 2003
26/31
New Approach: Blocker Tag [JRS 03]
Blocker simulatesall possible tags!!
1,2,3,,2023 pairs
of sneakers and
(reading fails)
8/3/2019 Kaliski Wireless Security Wwc 2003
27/31
How It Works
Tree-walking protocol for identifying tagsrecursively asks questions about tag serialnumbers:
Is there a tag whose next bit is a 1?
Is there a tag whose next bit is a 0? Blocker tag always says yes to bothquestions
Makes it seem like allserial numbers are present
Thus reader cannot figure out which ones areactuallypresent
Number of possible serial numbers is huge, soreader stalls
8/3/2019 Kaliski Wireless Security Wwc 2003
28/31
Consumer Privacy + CommercialSecurity
Blocker tag system should protect privacy butstill avoid blocking unpurchaseditems
Blocker tag can be selective:
Privacy zones:Only block certain ranges of
RFID-tag serial numbersPolite blocking:Inform readers about which
ranges are privacy zones so that readers dont
stall
Zone mobility:Allow shops to move items into
privacy zone upon purchase
8/3/2019 Kaliski Wireless Security Wwc 2003
29/31
Conclusions for Further Thinking
The wireless industry is weaving a computingand communications fabric where none existed
What happens then?
MITs Project Oxygen gives one glimpse, many
similar activities in progress With trustworthy, private, safeaccess,
computing benefits everyone
8/3/2019 Kaliski Wireless Security Wwc 2003
30/31
8/3/2019 Kaliski Wireless Security Wwc 2003
31/31
Burt KaliskiDirector and Chief Scientist
+1 781 515 7073
Top Related