Literature DB >> 28036085

RFID Ownership Transfer with Positive Secrecy Capacity Channels.

Jorge Munilla1, Mike Burmester2, Alberto Peinado3, Guomin Yang4, Willy Susilo5.   

Abstract

RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement these channels with noisy tags and provide practical values, thus proving that perfect secrecy is theoretically possible. We then define a communication model that captures spatiotemporal events and describe a first example of symmetric-key based OTP that: (i) is formally secure in the proposed communication model and (ii) achieves privacy with a noisy tag wiretap channel without TTPs.

Entities:  

Keywords:  EPCglobal Gen2; RFID; ownership transfer; trusted third party

Year:  2016        PMID: 28036085      PMCID: PMC5298626          DOI: 10.3390/s17010053

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

Radio frequency identification (RFID) is a widely-deployed technology for supply-chain and inventory management, retail operations and more generally automatic identification. Most of these applications need to be secured. Ownership transfer protocols (OTPs) allow the secure transfer of tag ownership from a current owner to a new owner. Three different entities are present in an OTP: the tag whose rights are being transferred, the current owner who has the initial control of and the new owner who will take control of when the protocol is completed. OTPs must incorporate security requirements that protect the privacy of both the new and the previous owner of the tag. For RFID applications privacy addresses anonymity that protects the identity of tags and untraceability that prevents interrogations (partial or completed) of a tag being linked. Formal definitions for secure ownership and ownership transfer are provided by van Deursen et al. [1], while several theoretical models have been proposed in the literature that address the privacy of RFID systems [2,3,4,5]. Several OTPs that address security issues have been proposed. However, preventing a previous owner from accessing the key(s) of a tag whose ownership was transferred is still an unsolved problem when symmetric-key techniques are used [6,7]. The current approach for privacy is to either employ a trusted third party (TTP) to break the trust link between a tag and its owner (e.g., [8,9]), or an isolated environment (ISE) (e.g., [10,11]) without any adversarial interference. The first approach is centralized and not appropriate when tags belong to different authorities/companies. In fact, the TTP can be considered as the real holder of the tag’s rights, while the different owners have simply delegated ownership. The second approach assumes a weak threat model and, as claimed in [7]: if such protection is adequate, then there is no need for security. Our main contributions in this paper are to: Define a communication model for ownership transfer that addresses spatiotemporal connectivity (Section 3). Many OTPs do not specify the communication setup and assume channels that are impractical for RFID settings. Provide a theoretical analysis of wiretaps with noisy tags (Section 4), show how these could be implemented and prove that perfect secrecy is achievable. Present an OTP that is provably secure in this communication model and that uses a wiretap channel with noisy tags to achieve privacy (Section 5). This is the first example of symmetric-key-based OTP that does not require TTPs or an ISE. GNYlogic and strand spaces [12,13,14,15] are used in the Appendix A for the security analysis.

2. Background

2.1. Definition and Security Requirements

Tag ownership can be defined as the ability to identify and/or access the tag, which in turn usually implies knowledge of private keys stored on the tag. Ownership transfer protocols enable the transfer of ownership rights of a tag from the current owner , or seller, to a new owner or buyer. At the beginning of the OTP, the seller is the only entity that can identify and trace , while when the OTP is completed, can only be identified and/or traced by the buyer. A TTP is usually deployed to manage this ownership transfer. We next list some specific security requirements for OTPs: Unlinkability or untraceability. An adversary that physically tracks tags can easily determine which executions are linked. This cannot be prevented. Unlinkability is related to the capability of linking interrogations after this physical tracking is temporarily interrupted. Different formal models can be found in the literature (e.g., [2,3,4]). Intuitively, a protocol guarantees unlinkability or privacy if no adversary can decide with advantage better than negligible whether two messages taken from different protocol executions belong to the same tag or not. Privacy of (backward secrecy): The current owner cannot identify once ownership rights are transferred to the new owner . Privacy of (forward secrecy): Once ownership rights of are transferred to the new owner , past communications between and previous owners cannot be traced by an adversary (or subsequent owners), even if the current private information stored on is revealed (e.g., by physical attacks). OTPs are sometimes designed [10,16,17] to provide extended capabilities such as: tag assurance, undeniable ownership transfer, current ownership proof, ownership delegation and authorized recovery.

2.2. Related Work

We only review the most relevant symmetric-key-based OTPs for RFID. Saito et al. [18] and Molnar et al. [16] presented in 2005 the first OTPs for RFID applications. Saito et al. proposed two protocols: one with and one without TTP. The security of the latter is based on the short range of the backward channel and assumes that it is hard for adversaries to eavesdrop on this channel. Molnar et al. proposed a scheme with TTP to manage tag keys by using a tree structure. Some vulnerabilities of this scheme are discussed in [19]. Soppera and Burbridge [20] modified Molnar et al.’s scheme by replacing the TTP with distributed local devices called RFID acceptor tags. Osaka et al. [21] used a kind of TTP with hash values to protect messages and a keyed encryption function for ownership transfer. Chen et al. [22] and Japinnen and Hamalainen [23] modified Osaka et al.’s scheme to prevent DoS attacks. Yoon and Yoo [24] also modified Osaka et al.’s scheme, by assuming that owners are able to change the tag’s key in an ISE. Their scheme had some vulnerabilities described in [25]. Dimitriou [26] proposed RFIDdot, an ownership transfer scheme based on random nonces and a keyed encryption function, making the assumption that key updates are performed in a private environment. More recently, Song and Mitchell [27,28] also assumed an ISE, but used keyed hash functions and one-time tag identifiers with hash chains. Kapoor and Piramuthu proposed two new schemes [7] based on a TTP and ISE respectively for the transfer of single tags, while a variant of these protocols for multiple tags has also been published [29]. Finally, several schemes have recently been proposed that comply with the EPCGen2 [30] standard for low-cost tags in the UHF band. These again assume TTPs or ISE and combine simple XOR operations, Cyclic Redundancy Codes (CRC16) and/or use the on-board PRNG as the security primitive (e.g., [9,31,32,33]). The security problems of some of these have been described recently [34].

Motivation: Comparison with Previous Works

As observed, the ownership transfer protocols proposed in the literature rely either on the use of TTPs or the assumption of an ISE. Typically, TTPs have a centralized management that may not be compatible with the distributed management of RFID systems. For example, the RFID parties (the owners) with possibly conflicting interests must trust the TTP that manages their tags. On the other hand, the assumption of ISEs where no adversary can interfere is an assumption of a weak adversary model: if such an environment were available, then no other security protection would be needed [7]. This paper proposes a key exchange protocol that addresses the new owner’s privacy concerns without resorting to either TTPs or an ISE. The discussed protocols also use communication models that are sometimes impractical for real-life scenarios. To illustrate this, let us consider the two protocols proposed in [7]: one with TTP, the other without TTP (but with an ISE), whose flows are shown in Figure 1. In the first, Figure 1a, the TTP does not use a reader to communicate with tag , but communicates directly (Flows 1–2). This begs the question: if such a TTP were installed in the buyer’s or seller’s location, what trust issues would arise if the transferred goods belong to different authorities. In the second protocol, Figure 1b, interacts first with the current owner (the seller, Flow 2) and then with the new owner (the buyer, Flows 3–6). However if something goes wrong (Flow 6 is not received correctly), then the process must be repeated from the beginning. This implies that the buyer and the seller must be available during the transaction, which restricts the possible transaction scenarios to one location (e.g., to a shop). In this paper, we define a communication model where tags can only communicate through readers. This leads to designs of protocols with, if deployed, centralized TTP infrastructures and, in contrast to the examples described above, that allow the seller and buyer to be in different physical locations.
Figure 1

Example sketches of ownership transfer protocols (OTPs) with trusted third parties (TTPs) (a) and without TTPs (isolated environment) (b) [7].

3. A Communication Model for RFID Ownership Transfer

3.1. Entity Capabilities

High-level entities include RFID readers, servers and TTPs. In general, these are able to perform complex cryptographic operations, such as asymmetric encryption/decryption and digital signatures/verification. RFID tags: In this paper, we are only concerned with UHF passive tags that operate in the far field [35], which are the most common for supply chain applications. These work at higher distances than tags with inductive coupling, but the delivered power is low; therefore, not too complex (lightweight) cryptographic tools should be used [36]. Low price is also a common requirement, and therefore, tamper-resistant shielding and on-board clocks cannot be usually assumed.

3.2. Communication Model

This is defined in terms of its channels with security features, such as privacy and integrity, and connectivity (availability).

3.2.1. Privacy/Integrity Channels

Between high-level entities (readers, servers or TTPs): These can be considered secure, since fully-fledged cryptographic techniques can be used. Between readers and tags: By contrast, these are particularly vulnerable; they are wireless (the adversary can eavesdrop and block/modify/inject messages), and tags can only implement lightweight cryptographic mechanisms. Passive tags can only communicate with active entities that are physically close and provide them with energy: i.e., RFID readers.

3.2.2. Connectivity

Connectivity is a function of space and time. As far as we know, OTPs proposed in the literature do not discuss spatiotemporal connectivity issues, though several ( e.g., [7,9,17]) assume channels that allow high-level parties, including a TTP (e.g., [7]), to communicate with a tag in real time during the execution of the OTP: for example, to restart the protocol if it fails. This implies that must be physically close to the corresponding high-level parties during the execution of the protocol, which in many practical scenarios may not be the case. Suppose for example that a client purchases RFID-tagged items for tracking and counterfeit prevention via the Internet. The seller dispatches the items, and when these reach the destination, the client requests the transfer of ownership rights. In this case, ownership transfer takes place in a different location from the seller’s location, and a different connectivity model is needed, where the seller cannot communicate with the tags at this stage (likewise, buyers cannot communicate with tags at the beginning of the transaction). We also need a spatiotemporal TTP network infrastructure in which TTPs may have to communicate in real time (as in [7]). Figure 2 illustrates the differences between the traditional and the extended communication model.
Figure 2

OTP communication models. (a) Basic model (static); (b) Dynamic model.

Let , , TTP be the readers of , , TTP, a tag, be OTP parties and , stand for “there exists a channel at time t between ”, “there exists a secure channel at time t between ”, respectively. When t is not indicated, continuous connectivity is assumed. We formally define the connectivity requirements of the OTP model by the relations: , . Thus, a TTP, if deployed, can only communicate with tags via readers , .

4. A Wiretap Channel with Positive Secrecy Capacity

To guarantee the privacy of a new owner of a tag and prevent the previous owner from accessing , and must agree on a fresh key in the presence of : that is, with a potential eavesdropper. Note that has full knowledge of the private keys of . We shall show that by using Wyner’s wiretap channel [37] with noisy tags, we can achieve positive secrecy. The fundamental property of the superposition of the wireless medium can be pitted against eavesdropping by using interference at the physical layer to degrade communication. Degrading is implemented via reader-controlled interferers called noisy tags. Noisy tags were first used by Juels et al. [38] to protect consumers from unwanted RFID scanning. Later, Castellucia and Avoine [39] used noisy tags for sharing secret keys, which however only addresses passive adversaries since authentication is not ensured. We shall assume that noisy tags do not present any special features, so any tag can become a noisy tag. If more sophisticated noisy tags are available, then implementations with better performance can obviously be achieved. We use the following notation: are random variables taking values in the alphabets , respectively. Figure 3 depicts our model of a wiretap channel with input alphabets , output alphabet and transition probabilities .
Figure 3

A model for the wiretap channel with noisy tags.

Tag transmits the message S (coded as X) to the new owner (the intended receiver) with the help of noisy tags, in the presence of the current owner , who acts as a passive eavesdropper. The wiretap channel can be seen as a stochastic encoder of X with output alphabet . The variable Y is input to the maximum a posteriori probability (MAP) estimators of and , but while only knows the value of Y, also knows the values of the inputs . Thus, if we assume the wireless medium is noiseless, then the estimate of is correct, while the estimate of is degraded by the stochastic encoder. This degradation can be quantified by the conditional entropy . The capacity of the eavesdropper channel (’s) is defined as . The secrecy capacity for the wiretap model is , where is the capacity of the main channel (’s). In the noiseless case, we have , and therefore, the secrecy capacity coincides with the conditional entropy of the eavesdropper , while the analysis of secrecy reduces to the eavesdropper’s channel. In general, the more degraded the wiretap channel, the higher the secrecy capacity. We assume for this analysis that the adversary cannot identify the source of each message via signal characteristics (fingerprints, level power, phase shifts, etc.). This implies that tags should be close and implement the same modulation alphabet; i.e., , . Possible implementation imperfections, such as delays, signal levels, frequency deviations, etc., should not reveal their origin; i.e., be insignificant or have sufficient randomness. Note that this assumption is implicit in the RFID literature in protocols that address privacy issues: traceability cannot be prevented if tags are physically identified. In this particular case, to prevent an adversary from identifying the target tag, we should guarantee that the tag is close enough to the noisy tags and that it does not present distinguishable imperfections; i.e., insignificant or significant, but changing in every execution. In practice, fortunately, although it is true that no two tags have identical signals, the differences are typically insignificant, making it hard to disambiguate them. As a consequence of the superposition property of the wireless channel, from a theoretical point of view, any modulation can be used (with initial calibration if required), but in practice, some modulations have better features than others. Figure 4 shows a simplified example that uses PPM (pulse position modulation). A bit is encoded by transmitting a pulse in one of two possible time slots. Synchronization between tags is helped by the fact that they share the same reference (reader’s) signal. Perfect synchronization is not necessary: tags may have different delays provided there is no pattern that can be exploited to identify a tag.
Figure 4

Alphabet for tag and two noisy tags using pulse position modulation (PPM).

If noise and imperfection implementations are not considered, the security of the system relies exclusively on the stochastic encoder. For r-ary input alphabets , with , , the output alphabet is , and the cardinality of (combinations with repetition of r elements taken at a time) and the transition probabilities can be computed as follows: where is the output symbol resulting from the combination of symbols , symbols , and so on, until symbols , with . Particularizing for binary input alphabets (), , with (), the output alphabet is , where is the combination of i symbols and symbols . The transition probabilities are given by: ’s detector receives and applies the decoding specified by: with g the mapping function . The error probability, defined as , is computed as: where the last summand is zero when is even. Figure 5 plots the secrecy capacity of the wiretap channel, the error probability and Fano’s bound, against the number of noisy tags. Secrecy increases sharply until ; as , the equivocation of the eavesdropper approaches the unconditional source entropy, and we get perfect secrecy: . For , the secrecy capacity offers a good compromise between features and ease of implementation. The capacity of ’s channel is just bits.
Figure 5

The conditional entropy, error and Fano’s bounds of the wiretap channel.

5. An Ownership Transfer Protocol

We next present an example of an OTP that: (i) works according to the communication model defined in Section 3.2 and (ii) uses a channel with positive secrecy capacity, implemented with noisy tags, to guarantee the privacy of the new owner. The protocol addresses practical design features, such as (secure) singulation of tags and the interrogator-talks-first requirement (communication must be initiated by the reader), and guarantees that the information stored on the tag coincides with that provided to the new owner (tag assurance [17]). Note also that it complies with the restrictions in Section 3.1 regarding entities’ capabilities. That is, while RFID readers can implement fully-fledged cryptographic tools, RFID tags are restricted to a pseudorandom number generator (PRNG) and a cryptographic (one-way, collision-resistant) hash function . The number of inputs is, however, designed to be intentionally low so that it can be more easily adapted to other possible primitives. We assume that identifiers, random numbers and keys all have the same (bit) length n, which is the security parameter of the protocol. We introduce our notation.

5.1. The Ownership Transfer Protocol, Figure 6

Initialization Initially, each owner knows for each tag its information and private key . Likewise, each tag stores, along with its identifier and , the identifier of its owner and the private key. agree to transfer ownership of tag with identifier . sends (secure channel) manufacturer information about the tag ( when hashed). Setup for Ownership Transfer regularly broadcasts messages to detect the presence of tags. When receives a (presumably because it is within the range of ), it selects a random nonce and sends: searches for a pair in its database to get a match. If there is no match, then the process is repeated from Step 2. Otherwise, is singulated: selects a random nonce and a request OTR and sends: checks to authenticate . does not reply if there is no match. Otherwise, it computes , saves , , until the protocol completes or a new command from is received and replies with: If this message is not received correctly by after a period of time, the protocol is repeated from Step 2 ( will replace the stored values ). Otherwise, computes and confirms (secure channel) to that is ready to be transferred: Ownership Transfer If receives ’s confirmation, then it is ready to take ownership of . computes and broadcasts regularly messages. When receives a , it selects a random nonce and sends: If is singulated, then selects a fresh random number and sends: checks this message for , and if not correct, for (and waits for new commands). It does not reply if this is not correct. If is authenticated, updates the stored values to . These values determine tag ownership. acknowledges this by sending: If the received message is not correct, the protocol is repeated from Step 7. Otherwise, executes the key update protocol in Section 5.2 to prevent from accessing .

5.1.1. Analysis

In the Appendix A, we shall use GNY logic [12], which extends the Burrows–Abadi–Needham (BAN) logic (overcoming some of its problems [13,14]), to show the consistency of the assumptions with respect to the source message, as well as the beliefs of the sender and receiver of messages. Principals can only advance their beliefs and increase their possessions based on the physical content of the messages they receive. We use strand spaces [15] to show correctness by excluding vulnerabilities based on the structure of the protocol. Strand spaces use free encryption algebra to detect faults that exploit relations in this algebra. Below, we discuss the most important security properties informally. Untraceable singulation: Replies to ’s (Step 2, Step 7) have the same format and include a nonce selected by the tag. This prevents tag tracing, since messages look random to anyone who does not know the secret key. The privacy of is guaranteed because the key remains unknown to the new owner . Indeed, if can compute given the values: , and , then can also find the F-preimage of , which contradicts the assumption that F is one-way. Forward secrecy: Suppose the adversary succeeds in getting the new key of a tag. The privacy of the prior communications is guaranteed, as in the previous case, because to get from , one has to invert F. The privacy of is achieved by using the key update protocol in Section 5.2. Tag assurance: is the hash of manufacturer information about the tag. The collision resistance of hash functions prevents the adversary from finding another message (pre-image) with the same hash to forge the information given by the manufacturer. The use of to compute guarantees that the information provided by to matches with the information stored by . Note, however, that cloned tags and corruptible memories are beyond this security feature (cf. [17]).

5.2. A Key Update Protocol, Figure 7

The parties are: the reader , tag and noisy tags , . shares with a private key and with each a private key . In this protocol, updates privately the key with a fresh key . broadcasts a key change request (KCR) with a random nonce . Upon receiving this, and generate bitstrings S and of length and broadcast these simultaneously (as specified in Section 4): S is a random number, and , where is a cryptographic hash function of length . Note that could be built from F; for example, for , , where denotes concatenation. receives the added signals of S and , extracts S, computes and broadcasts . computes and checks that the message from is correct. If so, updates its private key to . checks the received message. If correct, the key update protocol (KUP) is completed, and informs . Otherwise, sends a new and checks if has updated its key. If not, the KUP is repeated.

5.3. Analysis

Attacks by external adversaries on the KUP can target privacy (traceability) or availability (de-synchronization). These are prevented by the wiretap channel with positive secrecy and a cryptographic hash function that authenticates messages. More specifically: Traceability: remains untraceable because the exchanged messages look random to anyone who does not know . De-synchronization: The adversary cannot compute or , that are required by parties to update their keys, without knowing . The protection extends to threats from past and future owners of . For example, even if knows and can get , does not know the keys of the noisy tags and, therefore, cannot filter out to get S and compute . In particular, knows bits of S, but the remaining n bits remain unknown. Thus, once the KUP is completed, has no control over the tag and cannot trace it.

6. Conclusions

Cryptographic protection is usually handled at the application layer and cannot exploit signal features at the physical layer, which restricts its scope. We have shown in this paper that backward privacy of an OTP can be guaranteed with the use of channels with positive secrecy capacity. The implementation of such channels with noisy tags has been analyzed and the value , for which the capacity of the eavesdropper’s channel is only bits, provides a good compromise between performances and the ease of implementation. We also defined a communication model for RFID ownership transfer that captures spatiotemporal requirements. Protocols defined in this model can be applied to a wider range of practical scenarios. Finally, we have presented the first example of a symmetric-key OTP that does not require a TTP or ISE and formally proved that it is correct and secure in this model.
  1 in total

1.  An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.

Authors:  Mike Burmester; Jorge Munilla; Andrés Ortiz; Pino Caballero-Gil
Journal:  Sensors (Basel)       Date:  2017-07-04       Impact factor: 3.576

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.