Advanced Cryptographic Protocols for RFID Tags
Prof. Giuseppe AtenieseThe Johns Hopkins University (USA)
Summary:
RFID tags will soon replace barcodes on any products we buy at the store. They will also be embedded in keys, credit cards, tickets, license plates, passports and, possibly, in bank-notes and checks. Companies already sell RFID tags that can be implanted in our body to monitor our health status or for identification purposes. The way information stored into RFID tags is protected will directly affect the success rate of this emerging technology. RFID tags can be cloned, swapped, or tracked. Information stored into tags can be abused and manipulated. Cryptography could play a major role in this area since it enables effective ways of achieving confidentiality, authentication, and integrity protection. However, cryptographic techniques will have to be tailored for the unique environment
in which RFID tags operate: Unlike other small devices, such as
smartcards and sensors, passive RFID tags have no internal power
source and must be inexpensive. Thus, RFID tags will always have
limited communicational and computational capabilities, regardless
of how fast technology progresses.
Researchers have proposed several new techniques and protocols
for RFID systems to enable security services and provide privacy
protection. We will survey relevant papers in the field and report on
the latest results. The main focus of this seminar is on the
theoretical
aspects of the techniques being discussed. Background information
on group theory, bilinear maps, and public-key cryptography will
also be provided.
Security and Privacy in Upcoming Wireless Networks
Prof. Levente ButtyanBudapest University of Technology and Economics (Hungary)
Summary:
Emerging wireless technologies, such as wireless sensors networks,
vehicular ad hoc networks, wireless mesh networks, RFID systems, etc.
are about to dramatically change the deployment and operation
philosophy
of future wireless networks. Unfortunately, this evolution also
creates
new vulnerabilities, and raises serious concerns about security and
privacy that need to be addressed in order to avoid that ubiquitous
computing becomes a pervasive nightmare.
In this series of lectures, we will address some fundamental security
and privacy aspects of upcoming wireless networks. In particular, we
address the problem of naming and addressing, and explain how the
Sybil
and the node replication attacks can be thwarted; we examine how
security associations can be set up between wireless devices,
notably by
exploiting their physical proximity and mobility; we study the problem
of secure neighbor discovery and explain the wormhole attack along
with
techniques to thwart it; we describe techniques to secure the
fundamental operation of routing in wireless multi-hop networks; and
finally, we address the crucial issue of location privacy in future
wireless networks. Each of these problem areas will be examined in the
context of one or more emerging wireless technologies. In addition, we
will also provide some background information on sensor networks,
vehicular communications, and RFID systems, and on security and
privacy
services and mechanisms in general.
The lectures are primarily based on Parts I and II of the book
"Security
and Cooperation in Wireless Networks"
written by Levente Buttyan and Jean-Pierre Hubaux. The manuscript of
this book is available for free in electronic format.