Conditional privacy preserving security protocol for nfc applications

22
PRESENTED BY: GAUTHAM.U (4PA10TE011) Conditional Privacy Preserving Security Protocol for NFC Applications 3/14/2014 1 PACE TE DEPT

Transcript of Conditional privacy preserving security protocol for nfc applications

Page 1: Conditional privacy preserving security protocol for nfc applications

P R E S E N T E D B Y :

G A U T H A M . U

( 4 P A 1 0 T E 0 1 1 )

Conditional Privacy Preserving Security Protocol for NFC

Applications

3/14/2014

1

PACE TE DEPT

Page 2: Conditional privacy preserving security protocol for nfc applications

Contents

Introduction

Background

NFC Environment

Security Threats In The NFC

Proposed Method

Conclusion

3/14/2014

2

PACE TE DEPT

Page 3: Conditional privacy preserving security protocol for nfc applications

Introduction

Near Field Communication(NFC)

Short Range Wireless Communication Technology

Operational Frequency is 13.56MHz

Speed is 106Kbps to 424Kbps

Credit Card can be replaced by NFC in e-payment

3/14/2014

3

PACE TE DEPT

Page 4: Conditional privacy preserving security protocol for nfc applications

3/14/2014

4

PACE TE DEPT

Page 5: Conditional privacy preserving security protocol for nfc applications

3/14/2014

5

PACE TE DEPT

Page 6: Conditional privacy preserving security protocol for nfc applications

Background

This section introduces NFCIP-1 and also NFC-SEC the security method

NFCIP-1 is a near field communication interface and protocol.

NFC-SEC is a NFCIP-1 security services and protocol.

Pseudonyms

3/14/2014

6

PACE TE DEPT

Page 7: Conditional privacy preserving security protocol for nfc applications

3/14/2014

7

PACE TE DEPT

Page 8: Conditional privacy preserving security protocol for nfc applications

3/14/2014

8

PACE TE DEPT

Page 9: Conditional privacy preserving security protocol for nfc applications

NFC Environment

TSM is a institution that transfers the mobile financial data of customers to financial institutions safely.

SE is the security area that can safely store important data such as financial information ,authentication information and service applications.

3/14/2014

9

PACE TE DEPT

Page 10: Conditional privacy preserving security protocol for nfc applications

NFC Features

One to One communication

Near Field Communication

Sporadic Communication

3/14/2014

10

PACE TE DEPT

Page 11: Conditional privacy preserving security protocol for nfc applications

Security threats in the NFC

MITM attack

Eaves Dropping and Data Modulation

Privacy

Security Requirement

3/14/2014

11

PACE TE DEPT

Page 12: Conditional privacy preserving security protocol for nfc applications

Security Requirement

3/14/2014PACE TE DEPT

12

Data Confidentiality : Required to protect data from unauthorized users.

Data Integrity : Transmitted data should be identical to source data.

Unobservability : Data of specific users should not be distinguished from multiple data.

Unlinkability : When 2 data generated by the same user is presented ,the connectivity between the 2 data should not be identified.

Tracability :It is required to enable to find out who generated the data if a problem occurs.

Page 13: Conditional privacy preserving security protocol for nfc applications

Proposed Method

The conditional privacy method has widely been studied in the light of pseudonyms when the privacy protection is required.

Since the proposed method can reuse NFCIP-1 and NFC-SEC ,the NFC standards in most cases more efficient production is possible in the chip design sector and implementation

3/14/2014

13

PACE TE DEPT

Page 14: Conditional privacy preserving security protocol for nfc applications

Methods

MuPM method : If user A requests TSM for pseudonyms , TSM generates n pseudonyms and transmit it to user A ,then TSM stores the transmitted pseudonyms and ID of the user A.

A Pseudonym composed of public key , private key

ID of the TSM and signature of the TSM

• pseudonyms is generated as follows

3/14/2014

14

PACE TE DEPT

Page 15: Conditional privacy preserving security protocol for nfc applications

SuPM method: if we consider the NFC features in the protocol design process,the protocol can be configured so that it can update pseudonym without the need to communicate with TSM.

The communication with the TSM can be used only to keep track of the message constructor.

3/14/2014

15

PACE TE DEPT

Page 16: Conditional privacy preserving security protocol for nfc applications

3/14/2014

16

PACE TE DEPT

Page 17: Conditional privacy preserving security protocol for nfc applications

Conditional Privacy PDU:

In case information is hidden in all situations , there arises a problem where the personalized service is not provided.

In this method users can request services through protected PDU if they want to receive the personalized service

3/14/2014

17

PACE TE DEPT

Page 18: Conditional privacy preserving security protocol for nfc applications

3/14/2014

18

PACE TE DEPT

Page 19: Conditional privacy preserving security protocol for nfc applications

Analysis

3/14/2014PACE TE DEPT

19

MuPM method :

Additional storage to maintain the pseudonyms.

SuPM method :

Additional computation time.

Additional transference time.

Page 20: Conditional privacy preserving security protocol for nfc applications

Conclusions

With recent release of various terminals equipped with NFC , e-payment using NFC is expected to be activated.

In such situation , the user’s transaction information leaks can lead to the invasion of privacy.

In this situation , the conditional privacy protection methods are proposed to solve the aforementioned problems.

In conclusion , it is expected that the proposed method will help users to protect their privacy and use personalized services.

3/14/2014

20

PACE TE DEPT

Page 21: Conditional privacy preserving security protocol for nfc applications

References

3/14/2014

21

PACE TE DEPT

Page 22: Conditional privacy preserving security protocol for nfc applications

3/14/2014

22

PACE TE DEPT