3. OBJECTIVE
11/10/2013
Aim is to design location- aware secure RFID
schemes.
Two location aware defense mechanism for
enhancing RFID security and Privacy
1. Location Information can used to design selective
unlocking mechanism.
2. Location information can be used as the basis of
secure transaction verification
3
4. ABSTRACT
4
11/10/2013
Location awareness can be used by both tags and back-end
servers - unauthorized reading and relay attacks on RFID
systems.
For example application include access cards, toll cards, credit
cards, and other payment cards.
On the tag side to design a location-aware selective unlocking
mechanism.
On the server side to design a location aware secure
transaction verification scheme.
In this proposal of work is enhancing privacy and security it
does not rely on auxiliary devices or require any explicit user
involvement.
5. INTRODUCTION
RFID is low cost, small size it increasingly ubiquitous in
both public and private domains.
To address unauthorized reading and relay attacks in
RFID systems without necessitating any changes to the
traditional RFID usage model
Different types of attacks
1. ―Ghost –and- Leech attack‖
2. ―Reader- and- Ghost attack‖
5
11/10/2013
6. CONTD.,
11/10/2013
We specifically focus on the design of context
aware security primitives and protocols by utilizing
sensing technologies
To
provide
improved
protection
against
unauthorized reading and relay attacks.
RFID systems need to satisfy the requirements of
the underlying RFID applications
In terms of not only efficiency and security, but also
usability.
6
7. EXISTING WORK
o
o
o
o
o
11/10/2013
o
Hardware-based selective unlocking.
These include: Blocker Tag , RFID Enhancer Proxy,
RFID Guardian, and Vibrate-to-Unlock .
Cryptographic Protocals
Distance Bounding Protocals
Context- Aware- Selective
Another selective unlocking scheme
―Motion Detection‖
7
8. PROPOSED WORK
8
11/10/2013
A general research direction—one that utilizes sensing
technologies
To address unauthorized reading and relay attacks in
RFID systems without necessitating any changes to the
traditional RFID usage model.
here two location-aware defense mechanisms for
enhanced RFID security and privacy
1. To show that location information can be used to
design selective unlocking mechanisms.
2. To show that location information can be used as a
basis for secure transaction verification to defend
against the reader-and-ghost attacks.
10. CONCLUSION
11/10/2013
Using location and derived speed information, we
designed location aware Selective unlocking
mechanisms and a location aware transaction
verification mechanism.
To demonstrate the feasibility of our location-aware
defense mechanisms, we integrated a low-cost
GPS receiver with a RFID tag.
RFID platforms and improved tolerance to errors
whenever applicable.
10
11. REFERENCES
M. Buckner, R. Crutcher, M.R. Moore, and S.F. Smith, ―GPS
and Sensor- Enabled RFID Tags,‖http://www.ornl.
gov/webworks/cppr/y2001/pres 118169.pdf, 2013.
GM- 101 Cost Effective GPS Module with Ttl Rs-232
Interface,http://www.alibaba.com/productgs/435104168/
GM_101_Cost_Effective_GPS_ Module html,2011.
M. Buettner, R. Prasad, M. Philipose, and D. Wetherall,
―Recognizing Daily Activities with RFID-Based Sensors,‖
Proc.Int’l Conf. Ubiquitous Computing (UbiComp), 2009.
11/10/2013
11