ebook img

RFID Security: A Lightweight Paradigm PDF

186 Pages·2017·3.834 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview RFID Security: A Lightweight Paradigm

ACSP · Analog Circuits And Signal Processing Ahmed Khattab Zahra Jeddi Esmaeil Amini Magdy Bayoumi RFID Security A Lightweight Paradigm Analog Circuits and Signal Processing SeriesEditors MohammedIsmail,KhalifaUniversityofScience,Technology MohamadSawan,ÉcolePolytechniquedeMontréal Moreinformationaboutthisseriesathttp://www.springer.com/series/7381 Ahmed Khattab (cid:129) Zahra Jeddi (cid:129) Esmaeil Amini Magdy Bayoumi RFID Security A Lightweight Paradigm 123 AhmedKhattab ZahraJeddi EECEDepartment IntelCorporation CairoUniversity SantaClara,CA,USA Giza,Egypt MagdyBayoumi EsmaeilAmini TheCenterforAdvancedComputerStudies YahooCorporation UniversityofLouisianaatLafayette SantaClara,CA,USA Lafayette,LA,USA ISSN1872-082X ISSN2197-1854 (electronic) AnalogCircuitsandSignalProcessing ISBN978-3-319-47544-8 ISBN978-3-319-47545-5 (eBook) DOI10.1007/978-3-319-47545-5 LibraryofCongressControlNumber:2016958309 ©SpringerInternationalPublishingAG2017 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade. Printedonacid-freepaper ThisSpringerimprintispublishedbySpringerNature TheregisteredcompanyisSpringerInternationalPublishingAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Tomygreatparents,AhmedKhattab Tomyparentsandhusband,ZahraJeddi Tomyparentsandwife,EsmaeilAmini Tomydearstudents,MagdyBayoumi Preface Radiofrequencyidentification(RFID)isatypeofautomaticidentificationsystems which has gained popularity in recent years for being fast and reliable in keeping track of the individual objects. In RFID systems, contactless object identification is achieved using radio signals without the need for physical contact as the case withotherexistingidentificationtechnologiessuchasbarcodes.Therefore,ahuge number of items can be identified in a short amount of time with high reliability andlowcostwhichmakestheRFIDtechnologyveryattractiveforawiderangeof applicationssuchassupplychainmanagement,e-health,monitoringhumans,pets, animals, and many other objects, toll control, and electrical tagging. Furthermore, RFID technology eliminates the human error and reduces the total cost of the products. An RFID system typically consists of three main components: A transponder or tag which is implanted on the objects to be identified and stores the objects’ identification information such as the object’s identification (ID) number, the manufacturer name, and the product type; a transceiver or reader which provides an electromagnetic field in order to activate the tags and read their data through radiofrequencywaves;andaback-endserverwhichreceivesandprocessesthedata fromreaders. OutofthethreemaincomponentsofRFIDsystems,tagshavethemorestringent implementation limitations. In general, there exists three types of tags: passive, semi-passive,andactivetags.Activeandsemi-passivetagsareequippedwiththeir own batteries whereas passive tags rely on the radio frequency energy obtained fromthereader.Comparedtoactiveandsemi-passivetags,passivetagshavelonger lifetimeandaresmallerandlighter.However,theirsignalrangeisshorterthanactive tags.Passivetagsystemsareseverelyconstrainedintermsofchipareaandpower consumption as they do not have internal power source. This book focuses on the severelyresource-limitedpassiveRFIDtags. Unfortunately,RFIDsystemsfaceseveralchallengesintheirquesttoensurethe reliabilityofthesystem,qualityofservice,orreducedsystemcost.Onechallenge is the lack of global standardization. As a result of the existing numerous RFID applications,therearemanystandardsforRFIDsystems.Eachstandardisdesigned vii viii Preface tofitaspecificcategoryofapplications.Thiscreatesaprobleminintegratingseveral RFIDsystemswitheachotherandmakesthemanufacturingprocessharder.Another challengeismaintainingthetagcostaslowaspossibletocontributeinreducingthe total cost of the product. However, security is one of the biggest challenges that face any RFID systems. The RFID technology is vulnerable to security attacks by unauthorized reader(s) which can interrogate or modify the information stored in thetags.DuetothelimitedavailableresourcesinRFIDtags,providingprivacyand securityforRFIDsystemsismorechallengingthanothertraditionalcommunication systems.ThisbookisdevotedforthesecurityofRFIDsystems. RFID security threats are categorized into two main groups: privacy violation attacks and security violation attacks. In privacy violation attacks, the attacker tries to harvest the information stored in the objects by eavesdropping on the communicationsbetweentheobjectsandthereaderorbytrackingthem.Insecurity violation attacks, an adversary counterfeits the behaviors of legitimate tags or readers for making undesirable effects such as denial of service. Therefore, it is a necessity to develop mechanisms that provide privacy and security of the communications in RFID systems. This can be achieved via physical privacy protectionsolution,viaauthentication,orviacryptography. Several RFID security physical solutions have been developed such as killing tags,blocking tags,Faraday cages,and active interference.Each ofthesemethods has its pros and cons. For instance, killing a tag will cause the tag to lose its functionality,andhence,itcannotbereactivated.Thus,suchasolutionconsiderably reducesthelifetimeoftags.Meanwhile,intheblockingtagapproach,theattacker cannot have access to tags just in a defined range. Beyond this range, tags are not protected from attacks. In Faraday cage solutions, a wrapper shields the tag from the radio waves which imposes another cost to the system. Unauthorized readers are impeded to have communications with tags in active interference privacy protection solutions. However, sometimes some legal readers get blocked as well in the process. Based on the limitations and disadvantages of the physical securitysolutionsstatedabove,suchmethodsareonlyapplicableforsomespecific applications. Authenticationisaprocessthroughwhichanobjectproves itsclaimedidentity toanothercommunicationpartybyprovidingsomeevidencesuchaswhatitknows, whatithas,orwhatitis.Thisprocessisapplicablethroughonlysoftwaresolutions and it is not possible by physical solutions. In RFID systems, authentication is required in two phases. First, before beginning any communication, both the tag andthereadershouldverifytheiridentitytomakesurethattheyarecontactingwith the wished partner. The second phase is when data is exchanged between the two partiestoensurethattheexchangeddataisintact. Cryptography solutions keep the communication between two parties private in the presence of third parties. An encryption scheme is composed of five components: a plaintext, an encryption algorithm, a secret key, a ciphertext, and a decryptionalgorithm.Severalencryptionsolutionshavebeendevelopedforwireless communication systems to address such security challenges. On one hand, there exist several asymmetric or public key encryption algorithms that use two keys Preface ix to secure data in networked systems. However, such solutions are not applicable to RFID systems—despite their high security performance—due to the limited processingandpowercapabilitiesoftheRFIDtags.Evenexistinghighlyoptimized hardware implementation of such algorithms is way beyond what a typical RFID system can afford, such as the hardware implementation of Rabin cryptosystem which offers the best compromises between speed, area, and power consumption. Hence,RFIDencryptionalgorithmsmustbelightenoughintermsofareaandpower tosatisfytheresourcelimitationsofRFIDsystems.Likewise,usinghashfunctions isnotsuitableforconstrainedenvironmentssincetheyrequiresignificantamounts ofresourcesintheirdesigns,andhence,theyarenothardwarefriendly.Ontheother hand,severalsymmetricorprivatekeyencryptionalgorithmshavebeendeveloped, whicharelessresourcehungrycomparedtopublickeyencryptionalgorithms.Even though private key security algorithms promise reasonable security and meet the lowresourcerequirementsofRFIDsystems,theyarerequiredtobeintegratedwith otheralgorithms,suchasmessageauthenticationcode(MAC)algorithms,inorder toprovidethetargetedauthenticationandintegrityservices. In this book, after presenting the RFID security preliminaries, we present the redundant bit security (RBS) lightweight symmetric encryption approach which is suitable for RFID resource-constrained applications. In RBS, the message is intentionally manipulated by distributing redundant bits among plaintext bits, and thelocationoftheredundantbitsinsidethetransmitteddatarepresentsthesecretkey betweenthesenderandthereceiver.Meanwhile,thereisarelationshipbetweenthe plaintextdataandtheredundantdataintheRBSalgorithm.Theseredundantbitsare generated by a MAC algorithm whose input is the plaintext data. Therefore, these redundantbitscanbeusedforauthenticatingthemessageaswell.Thesecuritylevel of the RBS approach is adjustable through the number of redundant bits. In other words,thereisadependencybetweentheprovidedsecurityandtheauthentication part of the system which distinguishes the RBS algorithm from other existing algorithms. To have flexibility in the number of redundant bits, the implemented MAC algorithm generates variable length outputs. In addition to the number of redundantbits,theirvaluesandtheirpositionsintheciphertextarealsodetermining factorsinthesecurityofthegeneratedciphertext.Furthermore,someplaintextbits arealsoalteredbasedonthevalueoftheencryptionkeyandtheredundantbitsin order to make the generated ciphertext more secure against attacks. The security of the algorithm is analyzed against existing well-known attacks such as known plaintext,knownciphertext,chosenplaintext,anddifferentialattacks.Experimental and simulation results confirm that the RBS implementation requires less power and area overhead compared to other known symmetric algorithms proposed for RFIDsystems,especiallywhentheauthenticationisessentialasinharshoperating environments. RFIDSecurity:ALightweightParadigmtargetsawiderangeofreadersincluding but not limited to researchers, industry experts, and graduate students. This book presents the fundamental principles of RFID cryptography that the interested reader will be able to glean information not only to incorporate into his/her own particular RFID security design problem, but also most of all to experience an x Preface enjoyable and relatively effortless reading, providing the reader with intellectual stimulation.Thisbookalsooffersthereaderarangeofinterestingtopicsportraying the current state of the art in RFID technologies and how it can be integrated withtoday’sInternetofThings(IoT)vision.Readerswiththeoreticalinterestswill experienceanunprecedentedtreatmentofRFIDsecuritythattakesintoaccountthe practicallimitationsoftoday’stechnologies.Meanwhile,readersinterestedinreal- lifeRFIDsecurityimplementationswillbeexposedtoafirst-of-its-kindlightweight implementation that results in a significant multi-faced performance improvement compared to existing cryptosystems. In simple terms, while several existing RFID cryptography solutions have been developed, they are challenged by the inherent constraintsofpracticalimplementation.Analyzingtheseconstraintsandproposing anattractiveandpracticalsolutiontocountertheselimitationsarethebasicaimsof thisbook. Cairo,Egypt AhmedKhattab SantaClara,CA,USA ZahraJeddi SantaClara,CA,USA EsmaeilAmini Lafayette,LA,USA MagdyBayoumi Acknowledgements The authors would like to acknowledge Dr. Hong-yi Wu, Dr. Ashok Kumar, and Dr. Mohammad Madani for their precious comments and feedback that helped us furtherimprovethematerialpresentedinthisbook.WealsoacknowledgeHaythem Idriss,TarekIdriss,SultanArabiSultan,andShadyElmakhzangyfortheirhelpin collectingsomematerialusedinthebook.Theauthorswouldliketowarmlythank theSpringereditorialteamfortheirsupportandassistance. Dr. Khattab would like to dedicate a special expression of gratitude and appreciation to his family, especially his beloved parents, Khattab and Sanaa, for their patience and full emotional support throughout his career. He owes it all to them. Dr. Jeddi is deeply thankful to her family for their persistent care, trust, and support.Sheisdeeplyobligedtoherfatherwhotaughthertoworkhardforearning hersuccessandhermotherwhogaveherconfidencewithherendlesskindnessand inspiration.Shealsowouldliketoexpressspecialgratitudeandthankstowardher husband, Esmaeil Amini, for his kind cooperation and encouragement. She would alsoliketoexpressherappreciationtoMrs.MasoumehAbouroshibecauseshemay haveneverreachedthisplacewithoutherhelp. Dr.Aminiwouldliketoexpressspecialthankstohiswife,ZahraJeddi,forher encouragement, support, and contribution in preparing this book. He considers it an honor to thank his parents for their thoughtful consideration and unconditional love and support all throughout his life. Finally, he thanks the one above all of us,theomnipresentGod,foransweringhimprayersandgivinghisthestrengthto overcomethechallenges. Dr.Bayoumiwouldliketothankhisstudents,formerandcurrent,forenriching his life and keeping him young in heart and spirit. They are making the academic lifeexciting,interesting,andneverboring. xi

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.