Sécurité et protection de la vie privée dans les systèmes RFID, appliquées aux réseaux EPCglobal

Radio Frequency IDentification (RFID) provides a way to automate identification and to store information in individual RFID tags. These tags can be attached or embedded in an item to be identified and are read when they enter a RFID reader's antenna field. The Electronic Product Code (EPC) Clas...

Full description

Bibliographic Details
Main Author: TOUNSI, Wiem
Language:English
Published: 2014
Subjects:
Online Access:http://tel.archives-ouvertes.fr/tel-00978739
http://tel.archives-ouvertes.fr/docs/00/97/87/39/PDF/2014telb0291_Tounsi_Wiem.pdf
id ndltd-CCSD-oai-tel.archives-ouvertes.fr-tel-00978739
record_format oai_dc
spelling ndltd-CCSD-oai-tel.archives-ouvertes.fr-tel-009787392014-04-25T03:30:57Z http://tel.archives-ouvertes.fr/tel-00978739 WS_BIBLI_TB: 14167 http://tel.archives-ouvertes.fr/docs/00/97/87/39/PDF/2014telb0291_Tounsi_Wiem.pdf Sécurité et protection de la vie privée dans les systèmes RFID, appliquées aux réseaux EPCglobal TOUNSI, Wiem [INFO:INFO_CR] Computer Science/Cryptography and Security [INFO:INFO_CR] Informatique/Cryptographie et sécurité Wireless networks RFID Security Privacy Authentication Formal model Key generation systems Radio Frequency IDentification (RFID) provides a way to automate identification and to store information in individual RFID tags. These tags can be attached or embedded in an item to be identified and are read when they enter a RFID reader's antenna field. The Electronic Product Code (EPC) Class 1 Generation 2 (Gen2 for short) is a proper example of passive RFID technology. It represents the key component of an RFID architecture named EPCglobal network. However, if the tag carries more than just an identifier, the privacy of the tag holder may be violated. In this thesis, we deal with privacy issues in two levels of the EPCglobal network to only let authorized entities access private data. Our goal is to ensure that the data exchange from RFID tags to middleware and enterprise applications guarantees the privacy requirements, in environments where privacy control is paramount, e.g., home healthcare monitoring systems. The first part of this dissertation is dedicated to securing data exchange between RFID readers and passive tags. We provide a key establishment and derivation protocol for Gen2 systems, called KEDGEN2, to handle the flawed security model of the Gen2 tag memory access. KEDGEN2 achieves secure data exchange, based on a key generation model adapted to Gen2 tags. To prove the security of our model, we specify the protocol using the High Level Protocol Specification Language (HLPSL) and verify the expected security properties, using the Constraint-Logic based Attack Searcher (CL-AtSe) model checking tool. The current version of the protocol guarantees mutual authentication of participants and forward secrecy of the keys in the presence of active adversaries. It also guarantees backward secrecy with active adversaries bounded by limited communication range, which is consistent with typical RFID environments. As for derived keys, we propose adapting the Solitaire cipher, as a Pseudo-random Number Generator. To complement our approach, an additional filter is added and described in the second part of this dissertation. We focus on the collection of tag information through the RFID middleware component. The middleware is a central point that sits between RFID readers and database applications. It is in charge of collecting, filtering and aggregating the requested events from heterogeneous RFID environments. Thus, the system at this point is likely to suffer from parameter manipulation and eavesdropping, raising privacy concerns. We propose a privacy-enhanced approach as a part of the RFID middleware of the EPCglobal network, which does not interfere with the standard interface. Our approach is policy driven using some enhanced contextual concepts of the extended Role Based Access Control model. We use specifically, the PrivOrBAC privacy-aware model to store and manage privacy preferences, taking the declared purpose, the accuracy and the explicit consent, as privacy requirements. To show the feasibility of our approach, we provide a proof-of-concept prototype that we apply to the Fosstrak plateform, an open-source implementation of the EPCglobal specifications. 2014-01-14 eng PhD thesis
collection NDLTD
language English
sources NDLTD
topic [INFO:INFO_CR] Computer Science/Cryptography and Security
[INFO:INFO_CR] Informatique/Cryptographie et sécurité
Wireless networks
RFID
Security
Privacy
Authentication
Formal model
Key generation systems
spellingShingle [INFO:INFO_CR] Computer Science/Cryptography and Security
[INFO:INFO_CR] Informatique/Cryptographie et sécurité
Wireless networks
RFID
Security
Privacy
Authentication
Formal model
Key generation systems
TOUNSI, Wiem
Sécurité et protection de la vie privée dans les systèmes RFID, appliquées aux réseaux EPCglobal
description Radio Frequency IDentification (RFID) provides a way to automate identification and to store information in individual RFID tags. These tags can be attached or embedded in an item to be identified and are read when they enter a RFID reader's antenna field. The Electronic Product Code (EPC) Class 1 Generation 2 (Gen2 for short) is a proper example of passive RFID technology. It represents the key component of an RFID architecture named EPCglobal network. However, if the tag carries more than just an identifier, the privacy of the tag holder may be violated. In this thesis, we deal with privacy issues in two levels of the EPCglobal network to only let authorized entities access private data. Our goal is to ensure that the data exchange from RFID tags to middleware and enterprise applications guarantees the privacy requirements, in environments where privacy control is paramount, e.g., home healthcare monitoring systems. The first part of this dissertation is dedicated to securing data exchange between RFID readers and passive tags. We provide a key establishment and derivation protocol for Gen2 systems, called KEDGEN2, to handle the flawed security model of the Gen2 tag memory access. KEDGEN2 achieves secure data exchange, based on a key generation model adapted to Gen2 tags. To prove the security of our model, we specify the protocol using the High Level Protocol Specification Language (HLPSL) and verify the expected security properties, using the Constraint-Logic based Attack Searcher (CL-AtSe) model checking tool. The current version of the protocol guarantees mutual authentication of participants and forward secrecy of the keys in the presence of active adversaries. It also guarantees backward secrecy with active adversaries bounded by limited communication range, which is consistent with typical RFID environments. As for derived keys, we propose adapting the Solitaire cipher, as a Pseudo-random Number Generator. To complement our approach, an additional filter is added and described in the second part of this dissertation. We focus on the collection of tag information through the RFID middleware component. The middleware is a central point that sits between RFID readers and database applications. It is in charge of collecting, filtering and aggregating the requested events from heterogeneous RFID environments. Thus, the system at this point is likely to suffer from parameter manipulation and eavesdropping, raising privacy concerns. We propose a privacy-enhanced approach as a part of the RFID middleware of the EPCglobal network, which does not interfere with the standard interface. Our approach is policy driven using some enhanced contextual concepts of the extended Role Based Access Control model. We use specifically, the PrivOrBAC privacy-aware model to store and manage privacy preferences, taking the declared purpose, the accuracy and the explicit consent, as privacy requirements. To show the feasibility of our approach, we provide a proof-of-concept prototype that we apply to the Fosstrak plateform, an open-source implementation of the EPCglobal specifications.
author TOUNSI, Wiem
author_facet TOUNSI, Wiem
author_sort TOUNSI, Wiem
title Sécurité et protection de la vie privée dans les systèmes RFID, appliquées aux réseaux EPCglobal
title_short Sécurité et protection de la vie privée dans les systèmes RFID, appliquées aux réseaux EPCglobal
title_full Sécurité et protection de la vie privée dans les systèmes RFID, appliquées aux réseaux EPCglobal
title_fullStr Sécurité et protection de la vie privée dans les systèmes RFID, appliquées aux réseaux EPCglobal
title_full_unstemmed Sécurité et protection de la vie privée dans les systèmes RFID, appliquées aux réseaux EPCglobal
title_sort sécurité et protection de la vie privée dans les systèmes rfid, appliquées aux réseaux epcglobal
publishDate 2014
url http://tel.archives-ouvertes.fr/tel-00978739
http://tel.archives-ouvertes.fr/docs/00/97/87/39/PDF/2014telb0291_Tounsi_Wiem.pdf
work_keys_str_mv AT tounsiwiem securiteetprotectiondelaviepriveedanslessystemesrfidappliqueesauxreseauxepcglobal
_version_ 1716665865644015616