Security-Privacy

Security-Privacy - CEWIT - Center of Excellence in Wireless...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
CEWIT - Center of Excellence in Wireless and Information Technology Security and Privacy
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CEWIT - Center of Excellence in Wireless and Information Technology IEEE Spectrum July 2003 “They Know Where You Are” “[Benetton] is currently analyzing RFID technology"  "no feasibility studies have yet been  undertaken with a view to the possible industrial  introduction of this technology."
Background image of page 2
CEWIT - Center of Excellence in Wireless and Information Technology Characteristics: Passive device – receives power from reader Range of up to several meters In effect a “smart label”: simply calls out its (unique) name and/or static data “74AB8” “5F8KJ3” Plastic #3” A Basic RFID tag
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CEWIT - Center of Excellence in Wireless and Information Technology The capabilities of a basic RFID tag Little memory Static 64-to-128-bit identifier in current ultra-cheap generation (five cents / unit) Hundreds of bits soon Maybe writeable under good conditions Little computational power A few thousand gates Static keys for read/write permission No real cryptographic functions available
Background image of page 4
CEWIT - Center of Excellence in Wireless and Information Technology The grand vision: RFID as next- generation barcode Barcode RFID tag Line-of-sight Radio contact Specifies object type Uniquely specifies object Fast, automated scanning Provides pointer to database entry for every object, i.e., unique, detailed history
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CEWIT - Center of Excellence in Wireless and Information Technology Some applications Better supply-chain visibility -- #1 compelling application U.S. DHS: Passports U.S. FDA: Pharmaceuticals, anti-counterfeiting Libraries Housepets – approx. 50 million Parenting logistics Water-park with tracking bracelet RFID in Euro banknotes (?)
Background image of page 6
CEWIT - Center of Excellence in Wireless and Information Technology There is an impending explosion in RFID-tag use EPCglobal Joint venture of UCC and EAN Spearheading EPC (electronic product code) data standard for tags Basic-tag standard (Class 1 Gen 2) Wal-Mart requiring top 100 suppliers to start deploying RFID in 2005 Other retailers and DoD following Wal-Mart lead Pallet and case tagging first -- item-level retail tagging seems years away Estimated costs 2007: $0.05 per tag; hundreds of dollars per reader 2010: $0.01 per tag; several dollars per reader (?) A broader vision: “Extended Internet”
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CEWIT - Center of Excellence in Wireless and Information Technology Asymmetric Channel Strength Security Issue Address: 1,0,1,0 Random_Cmd Random_ID e.g. 27dbm e.g. -14dbm
Background image of page 8
CEWIT - Center of Excellence in Wireless and Information Technology Mutual Symmetrical Authentication Reader Tag Get_Challenge Random A Token 1 Token 2 Token 1 = E K (R B , R A ) Key K Key K Token 2 = E K (R A2 , R B )
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CEWIT - Center of Excellence in Wireless and Information Technology The Problems of Privacy and Security
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/11/2008 for the course EE 571 taught by Professor Jacob during the Spring '08 term at SUNY Stony Brook.

Page1 / 45

Security-Privacy - CEWIT - Center of Excellence in Wireless...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online