Self-adaptive RFID Authentication for Internet of Things Self-adaptive RFID Authentication for Internet of Things Bacem Mbarek, Ph.D. Masaryk University, Czech Republic Lasaris Lab ( Lab of Software Architectures and Information Systems) Masaryk UniversityBacem Mbarek Masaryk University PLAN Bacem Mbarek Introduction Problematic and Goals Contributions 1 2 3 4 Conclusion & Future works Masaryk UniversityBacem Mbarek what, really, is “RFID”? 3 Introduction Problematic and Goals Contributions Conclusion & Perspectives Authentication for RFID Systems Security  Radio frequency identification (RFID) is an automatic identification method,  Retrieve and access data using RFID tags  RFID tags are intelligent bar codes that can talk to a networked system which can track and identify every product using radio waves,  RFID system includes: • Tags, readers, database system  RFID tags are small, wireless devices that help identify objects and people. Masaryk UniversityBacem Mbarek Authentication for RFID Systems 4 Introduction Problematic and Goals Contributions Conclusion & Perspectives Authentication for RFID Systems Security AINA 2019 Tags Reader Secure channel Bacem Mbarek 5 Problematic Goals Introduction Problematic and Goals Contributions Conclusion & Perspectives Jamming attack Due to the lack of efficient key updating algorithms, previous schemes are vulnerable to jamming attacks. Masaryk University Bacem Mbarek 6Masaryk University Update of keys and Jamming attacks Problematic Goals Introduction Problematic and Goals Contributions Conclusion & Perspectives  After this attack, the secret information will be inconsistent between the reader and the tag. Therefore, the authentication will fail. An attacker generates a jamming signal The tag cannot receive the message from the reader and does not update its secret information while the reader updates the tag’s secret information. Bacem Mbarek 7 1 2 Problematic Goals Introduction Problematic and Goals Contributions Conclusion & Perspectives If the adversary compromises some tags, however, it obtains several paths from the root to those leaf nodes of the compromised tags, as well as the keys on those paths. Since keys are never changed in the static A practical solution is to update keys for a tag after each authentication so that the adversary cannot make use of keys obtained from compromised tags to attack uncompromised ones. Masaryk University Jamming attack and keys update Bacem Mbarek 8 RFID authentication protocol Contribution Introduction Problematic and Goals Contributions Conclusion & Perspectives Masaryk University  we have proposed a new self-adaptive RFID authentication protocol, named as SAM, to provide a secure and efficient tag-to-reader transaction in IoT applications.  By using dynamic key-updating algorithms, our proposed solution enhances the key updating system based on enabling different ways to authenticate packets, which significantly reduces the impact of jamming attacks.  One important advantage of our protocol is that it can be seamlessly deployed to existing systems for increasing the security of tag identification while at the same time maintaining the system efficiency. Bacem Mbarek 9 MACs verification Contribution Introduction Problematic and Goals Contributions Conclusion & Perspectives Step 1Updated key Pervious Keys The reader appends MACs with different keys, MAC Masaryk University Bacem mbarek 10 Algorithm Introduction Problematic and Goals Contributions Conclusion & Perspectives Masaryk University The first algorithm describes the different authentication steps done by the reader. Contribution Bacem mbarek 11 Algorithm Introduction Problematic and Goals Contributions Conclusion & Perspectives Masaryk University If some disclosed keys are lost due to packet loss or jamming attacks, the tag still can recover the key from the previous keys and check the authenticity of messages. Contribution Bacem mbarek 12  For each authentication, the reader generates N MACs(message authentication codes S= S= The readers have the property that if the updated keys are lost, they can be recomputed using previous keys, The readers have the property that if the updated keys are lost, they can be recomputed using previous keys, 11 22 Previous keys Introduction Problematic and Goals Contributions Conclusion & Perspectives Masaryk University Contribution Bacem Mbarek 13 Energy consumption Energy consumption Introduction Problematic and Goals Contributions Conclusion & Perspectives Bacem Mbarek 14 The average of authentication failure rate Introduction Problematic and Goals Contributions Conclusion & Perspectives The average of authentication failure rate Bacem Mbarek Conclusion 15 Conclusion Perspectives AINA 2019 Introduction Problematic and Goals Contributions Conclusion & Perspectives  we have proposed a new self-adaptive RFID authentication protocol, named as SAM,  One important advantage of our protocol is that it can be seamlessly deployed to existing systems for increasing the security of tag identification while at the same time maintaining the system efficiency.  Radio Frequency Identification (RFID) is an exciting, rapidly growing, multidisciplinary technology, which is capable of automatically and uniquely identifying objects or persons by radio frequency within certain proximity. Masaryk University Bacem Mbarek Perspectives 16 Conclusion Perspectives Introduction Problematic and Goals Contributions Conclusion & Perspectives  As future work, we plan to deploy SAM for real-world IoT network and further consolidate the performance of proposed authentication algorithms.  We will consider how to detect and discoverer other attacks against the RFID technology and will enhance its intrusion detection capabilities. RFID tags are likely to become even more popular in the future. Soon: Masaryk University Bacem Mbarek 17 Conclusion Perspectives AINA 2019 Introduction Problematic and Goals Contributions Conclusion & Perspectives Masaryk University Questions and Discussion Bacem Mbarek Faculty of Informatics Masaryk University Brno, Czech Republic bacem.mbarek@mail.muni.cz