20
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels

Privacy in pervasive computing What can technologists do?

  • Upload
    joy

  • View
    20

  • Download
    0

Embed Size (px)

DESCRIPTION

Privacy in pervasive computing What can technologists do?. David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels. The tide is turning. Pervasive computing is coming. It’s time to get serious about privacy. Outline. RFID and identification systems - PowerPoint PPT Presentation

Citation preview

Page 1: Privacy in pervasive computing What can technologists do?

#1

Privacy in pervasive computingWhat can technologists do?

David WagnerU.C. Berkeley

In collaboration withDavid Molnar, Andrea Soppera, Ari Juels

Phil Rogaway
Hi David,I have here grabbed a few slides relevant to EAX from a recent talk. Including a picture of EAX, could save you a bit of time drawing one.See you in India,Phil
Page 2: Privacy in pervasive computing What can technologists do?

#2

The tide is turning...

Pervasive computing is coming...

It’s time to get serious about privacy.

Page 3: Privacy in pervasive computing What can technologists do?

#3

• RFID and identification systems• Protocols for private identification• The challenge of scalability; trees of secrets

Outline

Page 4: Privacy in pervasive computing What can technologists do?

#4

Example applications:• Electronic passports• ID cards and badges• Proximity cards, building access control• Automatic payment systems (Fastrak, EZPass)• Item tagging & tracking, inventory management

Key technologies:• RFID• Contactless smart card

Identification systems

Challenge: privacy (and security) for ID systems

Page 5: Privacy in pervasive computing What can technologists do?

#5

RFID tags are passive, powered by reader, carry identity

Privacy issues: Unwanted tracking of people and items

Introduction to RFID

Power

Identity

Reader Tag

Page 6: Privacy in pervasive computing What can technologists do?

#6

• Tags might lack writable non-volatile memory• Takes more energy to permanently write bits• Thus, state might only last as long as tag is powered

• Cryptography is expensive• Public-key out of reach for all but priciest tags• AES within reach for mid-class tags? [Feldhofer]• Can’t take random number generation for granted

• Readers might not be network-connected

RFID systems are resource-limited

Page 7: Privacy in pervasive computing What can technologists do?

#7

Intended read range

Com

pu

tati

on

ISO 14443 E-passports, ID cardsUS$5

ISO 15693Library booksUS$0.50

EPCWalMartUS$0.20

10cm

3DES,RSA

sym.-keycrypto

no crypto

1m 3m

RFID technologies vary widely

Page 8: Privacy in pervasive computing What can technologists do?

#8

normalreader

(10cm / 3m)

maliciousreader

(50cm / 15m)

eavesdropon tag(???)

Read range?

eavesdropon reader

(50m / ???)

Page 9: Privacy in pervasive computing What can technologists do?

#9

Simple trick:Defeating eavesdropping on forward link

rm r

“go ahead”

wants tosend m

picksrandom r

Appears in EPC Gen II standards.

Page 10: Privacy in pervasive computing What can technologists do?

#10

A first attempt at defeatingeavesdropping and unauthorized tag-reading

Ek(r, ID)

kk“pseudonym”

Problem: All tags and readers share the same key k• If any tag is compromised, all security is lost• If any reader is compromised, all security is lost

Risk: Massive data spills.

Page 11: Privacy in pervasive computing What can technologists do?

#11

Take #2: Independently keyed tags

r, Fki(r)

Scans throughall keys to decode

ki

“pseudonym”

Problem: Doesn’t scale.• Takes O(N) work to decode each pseudonym

(k1, ID1) :(kN, IDN)

Page 12: Privacy in pervasive computing What can technologists do?

#12

Private identification protocols

Goal: a tag <-> reader protocol, providing:• Identification: Authorized reader learns tag’s identity• Privacy: Unauthorized readers learn nothing

• Attacker cannot even link two sightings of same tag

• Authentication: Tag identity cannot be spoofed• Scalability: Can be used with many tags

A non-trivial technical challenge,with many possible applications.

Page 13: Privacy in pervasive computing What can technologists do?

#13

A beautiful method for private identification

r, Fki(r), Fkij

(r)

ki, kij

pseudonym

More scalable: O(√N) work to decode each pseudonym• First, scan all ki to learn i• Then, scan all kij to learn j and thus tag identity

:(ki, i) :(i, kij, IDij) :

Decodes i, then j

Page 14: Privacy in pervasive computing What can technologists do?

#14

The tree of secrets

Tag leaf of the tree.Each tag receives the keys on path from leaf to the root.Tag ij generates pseudonyms as (r, Fki

(r), Fkij(r)).

Reader can decode pseudonym using a depth-first search.

k0

k00 k01

k0

k00 k01

k1

k10 k11

Page 15: Privacy in pervasive computing What can technologists do?

#15

Analysis: tree of secrets

Generalizations:• Use any depth tree (e.g., lg N)• Use any branching factor (e.g., 210)• Use any other identification scheme (e.g., mutual auth)

Theory A concrete exampleNumber of tags: N 220 tagsTag storage: O(lg N) 128 bitsTag work: O(lg N) 2 PRF invocationsCommunications: O(lg N) 138 bitsReader work: O(lg N) 2 210 PRF invocations

Privacy degrades gracefully if tags are compromised

Page 16: Privacy in pervasive computing What can technologists do?

#16

Reducing trust in readers

r, Fki(r), Fkij

(r)

ki, kij

If readers are online, Trusted Center can do decoding for them, and enforce a privacy policy for each tag.No keys stored at reader => less chance of privacy spills.

TrustedCenter

r, Fki(r), Fkij

(r)

IDij

Reader (kij, Policyij)

Page 17: Privacy in pervasive computing What can technologists do?

#17

Reducing trust: Delegation

r, Fki(r), Fkij

(r)

ki, kij

For offline or partially disconnected readers, can delegate power to decode pseudonyms for a single tag to designated readers.Reader workload: O(D) per pseudonym,where D = # of tags delegated to this reader.

TrustedCenter

IDij

kij

(kij, Policyij)

kij

Page 18: Privacy in pervasive computing What can technologists do?

#18

Time-limited delegation

pseudonym

ctr, ki, kij

TrustedCenter

IDij, L, R

{keys}

Only good for decodingL-th through R-thpseudonyms from tag IDij

Even less trust: Reader gets access to the next 100 pseudonyms from this tag (say), and nothing more.

Page 19: Privacy in pervasive computing What can technologists do?

#19

k0000

Enabling time-limited delegation

Use GGM at lower levels: (ks0, ks1) = G(ks)Tag uses leaves sequentially

Reader gets keys for a subset

k0

k00 k01

k0

k00 k01

k1

k10 k11

k000

k0001 k0010 k0011

k001

Page 20: Privacy in pervasive computing What can technologists do?

#20

• Identification systems: an exciting research area• Privacy is central• Many non-trivial technical challenges, many opportunities for clever solutions• There’s still time to have an impact on deployments

• Research question: Private identification protocols• Tree schemes have useful properties• Can we do better? Can do without persistent state?

• Recent work: Controlling readers with Trusted Computing (to appear at WPES’05)

Conclusions