SRG

DEU CENG Security Research Group

+90(232) 301 74 10

Tınaztepe Kampusu

Buca 35390 Izmir, Türkiye


CLICK HERE TO SEE THE PAGE ABOUT WISP


WISP PROJECTS & PUBLICATIONS & DATA

  • TUBITAK 215E225 NOLU PROJE
Proje Başlığı: Pasif RFID Etiketlerinde İletişim Güvenliğinin Arttırılması
Proje Amacı : Pasif RFID etiketlerinden olan WISP donanımı üzerinde mevcut güvenlik yöntemlerinin geliştirilerek iletişimde güvenliğin arttırılmasıdır.

  • Kösemen C., Dalkılıç G., " Designing a Random Number Generator for Secure Communication with WISP ", 2017 International Conference On Computing and Data Analysis (ICCDA 2017), 19-23 May 2017, Lakeland, Florida, USA, pp. 289-292. DOI:10.1145/3093241.3093285

  • Dalkılıç G., " RADYO FREKANSI İLE TANIMLAMA ETİKETLERİ İÇİN GERÇEK RASTGELE SAYI TABANLI ÜRETEÇ ", Dokuz Eylül University Faculty of Engineering Journal Of Science and Engineering, 18 (54/3), (2016), pp. 640-651. DOI: 10.21205/deufmd.2016185427

WISP ÜZERİNDEKİ KAYNAKLARDAN ELDE EDİLEN RASTGELE SAYILAR (500000 adet sayı örneği paylaşılmıştır.)
1- İVMEÖLÇER ** Dosyayı indirmek için tıklayınız. **
2- SICAKLIK SENSÖRÜ ** Dosyayı indirmek için tıklayınız. **
3- ADC ÜZERİNDEN ÖRNEKLEME ** Dosyayı indirmek için tıklayınız. **
1- DCO-VLO FREKANS FARKI ** Dosyayı indirmek için tıklayınız. **


WISP ÜZERİNDEKİ KAYNAKLARDAN ELDE EDİLEN RASTGELE SAYILARIN NIST TEST SONUÇLARI
1- İVMEÖLÇER ** Dosyayı indirmek için tıklayınız. **
2- SICAKLIK SENSÖRÜ ** Dosyayı indirmek için tıklayınız. **
3- ADC ÜZERİNDEN ÖRNEKLEME ** Dosyayı indirmek için tıklayınız. **
1- DCO-VLO FREKANS FARKI ** Dosyayı indirmek için tıklayınız. **


PROJECT SUMMARY

The aim of the project is enhancing communication security in passive RFID (Radio Frequency IDentification) tags. In the near future, the barcode located on almost all objects offered for sale will be replaced by low-cost passive RFID tags that do not have their own power supply, working by the energy harvested from the magnetic field that is emitted by the reader. Contrary to barcode, each RFID tag that will be added onto an object has a unique electronic product code. The first condition to ensure this unique structure is establishing security and preventing tag cloning. The first step of the attacker in an attack is eavesdropping the communication between the tag and the reader and providing useful information from this communication. Attackers are also launching attacks such as monitoring the RFID tag and blocking the communication between the reader and the RFID tag.

Some models of the passive RFID tags are equipped with the microprocessors and sensors which are attached to them. The most popular of these RFID tags is the WISP (Wireless Identification and Sensing Platform) hardware which is produced aiming to gather sensing, computing and RFID technologies together. We have already acquired two WISP 5.0 hardware which are produced in limited numbers at the end of the year 2014 in the Washington University research laboratories to use in our research. This equipment has ultra-low power microcontroller MSP430FR5969 (16 MHz, 64 KB FRAM, 2 KB SRAM), one accelerometer and one temperature sensor. Instant data which is obtained from the sensors such as the accelerometer and the temperature is transmitted to the RFID reader directly or after processing by the microprocessor. In the same way, the reader is able to send data to the RFID tag. This two-way communication must not be vulnerable to the interferences from outside. Similarly, third party should not process this data after accessing. Structurally, specific security infrastructure including the random number generation is settled down in such devices. Due to the low processing power of the passive RFID tags, especially produced random numbers do not satisfy the conditions for the randomness exactly, which leads to the vulnerability in authentication protocols. In the literature study, so many authentication protocols were suggested for passive tags, but it has been seen that a highly secure authentication protocol is not accepted as a standard because so many of these authentication protocols are not secure and have vulnerabilities. In the work to be done by generating random numbers passing randomness tests, using WISP 5.0 that has higher processing power than the previous passive RFID tags and the sensor data of this tag, highly secure authentication protocol that is appropriate to the processing power of the tag will be developed.

The method that will be followed during this study is first investigating all the details of WISP, producing true random number by using sensors and other hardware elements of WISP and testing these random numbers with known test methods in detail. Then, these numbers will be given as input to the genetic algorithm which is used in data mining and machine learning so the generation of the random numbers that can pass the randomness tests will be performed. Furthermore in this study, with a security level proven and accepted as secure in conventional systems, AES encryption method that is also included on WISP 5.0 as a hardware will be used. Then, developed authentication protocol will be implemented on WISP and security analysis will be performed.

At the end of this study, random number generator passing randomness tests and an authentication protocol having security analysis performed will be developed for RFID tags. Passive RFID tags, in order to distinguish objects relative to each other, are located on market products, toll road crossing systems (HGS) and on clothes. The products that you bought are not to be monitored outside the market, the toll tag that you bought for your car is not to be used in other cars, and the cloth that you bought is not to be identified in a clothing store, and this can only be achieved by authentication of the tags in a secure manner. In our study, in addition to developing a secure authentication protocol, creating patent and papers are our goals.


WISP - IMPINJ SPEEDWAY RFID (USA2M1 -FCC COMPLIANT) OKUYUCU İLE OKUMA İŞLEMİNİN FARADAY KAFESİNDE GERÇEKLEŞTİRİLMESİ

Home