18
Technieue for Preventing DoS Attacks on RFID System Conference:SoftCOM(2010) Author: Deepak Tagra, Musfiq, Rahman and Srinivas Sampalli Present: 102062595 侯侯侯

Technieue for Preventing DoS Attacks on RFID System

  • Upload
    eavan

  • View
    34

  • Download
    0

Embed Size (px)

DESCRIPTION

Technieue for Preventing DoS Attacks on RFID System. Conference:SoftCOM(2010) Author: Deepak Tagra, Musfiq, Rahman and Srinivas Sampalli Present: 102062595 侯宗佑. Outline. Introduction Security Issues Gossamer Protocol De-synchronization Attack Extension Conclusion. Introduction. - PowerPoint PPT Presentation

Citation preview

Page 1: Technieue for Preventing DoS Attacks on RFID System

Technieue for Preventing DoS Attacks on RFID System

Conference:SoftCOM(2010)Author: Deepak Tagra, Musfiq, Rahman and Srinivas SampalliPresent: 102062595 侯宗佑

Page 2: Technieue for Preventing DoS Attacks on RFID System

1/17

Outline

• Introduction• Security Issues• Gossamer Protocol• De-synchronization Attack• Extension• Conclusion

Page 3: Technieue for Preventing DoS Attacks on RFID System

Introduction

2/17

Page 4: Technieue for Preventing DoS Attacks on RFID System

Security Issues

• Vulnerable to Evasdropping.– Traffic analysis

• Confidential data• Personal privacy

– Spoofing• SQL injection• Data integerty

– Replay attack• De-synchronization

3/17

Page 5: Technieue for Preventing DoS Attacks on RFID System

Security Issues

• Deny of service– Kill command attack– Jamming– De-synchronization attack– Tag data modification

• Data encryption and authentication is required.

4/17

Page 6: Technieue for Preventing DoS Attacks on RFID System

Security Issues

• Difficulties– No power supply.– Cost must be low.– Limited hardware scale.

• Only able to do bitwise operation.• Classic encryption/authentication techniques cannot be

implemented.– AES,DES,SHA-1,md5....

• Protocol must be low-cost and light-weighted.

5/17

Page 7: Technieue for Preventing DoS Attacks on RFID System

Gossamer Protocol

• UMAP family– Tag anoymity– Data encryption– Mutual authentication

• Only bitwise logical operation.• Enhancement of SASI protocol.

– Using non-triangular function for encryption.

6/17

Page 8: Technieue for Preventing DoS Attacks on RFID System

Gossamer Protocol

• Tag identication

Reader TagHello

IDS

7/17

Page 9: Technieue for Preventing DoS Attacks on RFID System

Gossamer Protocol

• Mutual Authentication

Reader Tag

PRNG: (n1,n2)

Keys: (IDS,K1,K2)

Keys: (IDS,K1,K2)

A = f(IDS,K1,K2,n1,Const)

B = f(IDS,K1,K2,n1,Const)

C = f(IDS,K1’,K2’,n3,Const) A||B||C

n3 = MIXBITS(n1,n2)

8/17

Page 10: Technieue for Preventing DoS Attacks on RFID System

Gossamer Protocol

• Mutual authentication

Reader Tag

Keys: (IDS,K1,K2)

Extract n1, n2 from A,B

Compute C’, If C’ == C

D = (IDS,K1’,K2’,n1’,Const)

DCompute D’, If D’ == DSUCCESS

n1’ = MIXBITS(n3,n2)

n1’ = MIXBITS(n3,n2)

9/17

Page 11: Technieue for Preventing DoS Attacks on RFID System

10/17

Gossamer Protocol

• Key updating

TagReader

New Keys(IDSnew,K1new,K2new) = f(IDS,K1,K2,n1,n2,n3)

New Keys(IDSnew,K1new,K2new) = f(IDS,K1,K2,n1,n2,n3)

Old Keys(IDSold,K1old,K2old) = (IDS, K1,K2) )

Page 12: Technieue for Preventing DoS Attacks on RFID System

11/17

De-synchroniztion Attack

• Prevented

TagReader

Attacker

D(Blocked)

C(Blocked) New Keys(IDSnew,K1new,K2new) = f(IDS,K1,K2,n1,n2,n3)

Old Keys(IDSold,K1old,K2old) = (IDS, K1,K2) )

Old Keys(IDSold,K1old,K2old) = (IDS, K1,K2) )

Page 13: Technieue for Preventing DoS Attacks on RFID System

12/17

De-synchronization Attack

• Not prevented

TagReader

Attacker

A||B||C(Copied)

D(Blocked)

Old Keys(IDSold,K1old,K2old) = (IDS, K1,K2) )

New Keys(IDSnew,K1new,K2new) = f(IDS,K1,K2,n1,n2,n3)

Old Keys(IDSold,K1old,K2old) = (IDS, K1,K2) )

Page 14: Technieue for Preventing DoS Attacks on RFID System

13/17

Reader TagReader

Attacker

D’

A’||B’||C’New Keys(IDS’new,K1’new,K2’new) Old Keys(IDSold,K1old,K2old)

= (IDS, K1,K2) )

New Keys(IDS’new,K1’new,K2’new)

De-synchronization Attack

Page 15: Technieue for Preventing DoS Attacks on RFID System

14/17

Attacker Tag

D

A||B||C New Keys(IDSnew,K1new,K2new) = f(IDS,K1,K2,n1,n2,n3)

Old Keys(IDSold,K1old,K2old) = (IDS, K1,K2) )

De-synchronization Attack

Page 16: Technieue for Preventing DoS Attacks on RFID System

15/17

Reader TagReader

Attacker

IDS or IDSnew

HelloNew Keys(IDS’new,K1’new,K2’new) Old Keys(IDSold,K1old,K2old)

= (IDS, K1,K2) )

New Keys(IDSnew,K1new,K2new)

De-synchronization Attack

Page 17: Technieue for Preventing DoS Attacks on RFID System

Extension

Reader TagReader

Attack

IDS or IDSnew

HelloNew Keys(IDS’new,K1’new,K2’new) Old Keys(IDSold,K1old,K2old)

= (IDS, K1,K2) )

New Keys(IDSnew,K1new,K2new) Old Keys(IDSold,K1old,K2old) = (IDS, K1,K2) )

16/17

Page 18: Technieue for Preventing DoS Attacks on RFID System

17/17

Conclusion

• Classified DoS attack on RFID.• Point out the vulerbility of Gossamer protocol.• Propose a simple extension to solve the problem.