The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy

Preview:

DESCRIPTION

The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications Security, pp. 103-111. ACM Press. 2003. Presented by: Sean Mondesire. Contributions. Blocker Tags: Protects consumer privacy - PowerPoint PPT Presentation

Citation preview

The Blocker Tag: Selective Blocking of RFID Tags for

Consumer PrivacyA. Juels, R. L. Rivest, and M. Szydlo

8th ACM Conference on Computer and Communications Security,

pp. 103-111. ACM Press. 2003.

Presented by: Sean Mondesire

3/30/2006 The Blocker Tag 2

Contributionso Blocker Tags:

oProtects consumer privacyoRelatively inexpensiveoProves the RFID Bill of

Rights and practical tags can coexist

3/30/2006 The Blocker Tag 3

Agendao RFID Tagso Security Issueso Previous Worko Blocker Tags

• Privacy Protection• Malicious Blocker Tags

o Critique

3/30/2006 The Blocker Tag 4

RFID Tagso Simple Radio-

Frequency Identification Tags• Passive: Battery-less• Contain an assigned

serial number• Can be modified

o Replacement for the barcode• Cost about 5 cents• No more laser scanning• Consumers can use the

benefits

3/30/2006 The Blocker Tag 5

Security Issueso Eavesdroppers

• Gather what items are in your possession

• Privacy Violation Exampleso Dress sizeo Medicationo Amount of money in wallets

o Petty Thieves• Modify serial numbers in

store• Deactivate tags before

purchase

3/30/2006 The Blocker Tag 6

Previous Worko “Kill Tag” o Faraday Cage o Active Jammingo “Smart” RFID Tags

• Hash-Locks• Re-encryption

3/30/2006 The Blocker Tag 7

Tree-Walking Singulationo Singulation

• Reader processes one tag at a timeo Tree-Walking Singulation Algorithm

• Recursively signal tags with next prefix• Tag with prefix respond with next prefix

0 1

00 01 10 11

3/30/2006 The Blocker Tag 8

Blocker Tagso Goal:

o Protect the privacy of consumers affordably

o Motivation:o Guaranteed privacy will push

the use of RFID tagso How They Work

o Universal Blocker: For every signal send 0 and 1

o Selective Blocker: Block a subset of tags

3/30/2006 The Blocker Tag 9

Privacy Protection Toolo Selective Blocker:

• Forces readers to signal nonexistent and existent tags

• Readers cannot guarantee tags are in the vicinity

• Hides tags with false signalso Supermarket Example:

• Shelved items start with 0• Purchased items tags set to 1• Sticker of a blocker tag placed

on item’s tag (blocks 1’s)

3/30/2006 The Blocker Tag 10

Malicious Blocker Tagso Blocker tags that do not

respect the privacy zones• Blocker signaling 0’s in previous

exampleo Universal blockers are

maliciouso DOS attacks on readers

• Universal blockers: Readers signal all possible serial numbers

• Selective blockers: Simulate actual tags that should not be scanned at that time

3/30/2006 The Blocker Tag 11

Strengthso Inexpensive

• RFID to reply to signals• Less than 10 cents to

manufactureo Satisfies the RFID Bill of

Rightso Simple to implement

• Create tag that returns 0 or 1 when ever signaled

3/30/2006 The Blocker Tag 12

Weaknesseso Can force DOS on reader

• Encourages nonsense broadcastso Requires additional RFID tags

• Forces consumers to have blocker tags to guarantee privacy

o Many unanswered questions:• What if malicious blocker tags

were left throughout a store?• Thieves can swap tags easier

than barcodes

3/30/2006 The Blocker Tag 13

Areas of Improvemento Improve inefficiencies

placed on the Reader• Universal Blocker impractical• Limit blocking capabilities

o Incorporate blockers within each tag• Cost for addition registers

should be comparable to having separate blockers

3/30/2006 The Blocker Tag 14

Related Worko RSA Laboratories

• Inventors of RSA public-key cryptosystem

• Focus on RFID privacy and security

o Soft Blockingo Encryption in RFID

o RFID chips can carry a virus• Amsterdam’s Free University• RFIDs can return data to

infect a reader’s DB• Can spread to other tags

3/30/2006 The Blocker Tag 15

Contributionso Protects consumer privacy

• Readers can’t pinpoint existing tags

o Relatively inexpensive• About 5 cents for one antennae• At most 10 cents per blocker

o Proves the RFID Bill of Rights and practical tags can coexist• No sacrifices on consumer rights

3/30/2006 The Blocker Tag 16

Referenceso Juels, A., Rivest, R. L., and M. Szydlo, “The

Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy,” 8th ACM Conference on Computer and Communications Security, pp. 103-111. ACM Press. 2003.

o Reuters, “Scientists: RFID Chips Can Carry a Virus”, http://www.cnn.com/2006/TECH/ptech/03/15/rfid.virus.reut/index.html, CNN.com, March 15, 2006

o RSA Laboratories, http://www.rsasecurity.com/, March 28, 2006.

Recommended